CVE-2026-32384
Received Received - Intake
Local File Inclusion in WpBookingly ≀1.2.9 Allows Code Execution

Publication date: 2026-03-13

Last updated on: 2026-03-17

Assigner: Patchstack

Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magepeopleteam WpBookingly service-booking-manager allows PHP Local File Inclusion.This issue affects WpBookingly: from n/a through <= 1.2.9.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
magepeopleteam wpbookingly From 1.0.0 (inc) to 1.2.9 (inc)
magepeopleteam wpbookingly 1.3.0
magepeopleteam wpbookingly to 1.2.9 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-32384 is a Local File Inclusion (LFI) vulnerability in the WordPress WpBookingly plugin versions up to and including 1.2.9.'}, {'type': 'paragraph', 'content': 'This vulnerability allows a malicious actor with at least Contributor or Developer privileges to include local files from the target website and display their contents.'}, {'type': 'paragraph', 'content': "Included files may contain sensitive information such as database credentials, which could potentially lead to a complete database takeover depending on the site's configuration."}, {'type': 'paragraph', 'content': 'The vulnerability is categorized under the OWASP Top 10 category A3: Injection and has a CVSS severity score of 7.5, indicating a moderate risk.'}, {'type': 'paragraph', 'content': 'It was reported by the researcher "daroo" on January 19, 2026, and publicly disclosed on February 18, 2026.'}, {'type': 'paragraph', 'content': 'The issue is fixed in version 1.3.0 of the WpBookingly plugin, and users are advised to update to this version or later.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can allow an attacker with Contributor or Developer privileges to access and include local files from your website.'}, {'type': 'paragraph', 'content': 'Accessing these files may expose sensitive information such as database credentials.'}, {'type': 'paragraph', 'content': "If exploited, it could lead to a complete takeover of your database depending on your site's configuration."}, {'type': 'paragraph', 'content': "Such a compromise can result in data breaches, loss of data integrity, and unauthorized access to your website's backend."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability allows a malicious actor with at least Contributor or Developer privileges to include local files from the target website and display their contents. Detection involves checking if the WpBookingly plugin version is vulnerable (version 1.2.9 or earlier) and monitoring for suspicious file inclusion attempts.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts, you can look for unusual HTTP requests targeting the WpBookingly plugin endpoints that include parameters referencing local files.'}, {'type': 'paragraph', 'content': 'Specific commands are not provided in the resources, but general approaches include:'}, {'type': 'list_item', 'content': 'Review web server access logs for requests containing suspicious parameters that may attempt local file inclusion.'}, {'type': 'list_item', 'content': "Use tools like grep to search logs for patterns such as 'include', 'require', or file path traversal sequences (e.g., '../')."}, {'type': 'list_item', 'content': 'Check the installed version of the WpBookingly plugin to confirm if it is version 1.2.9 or earlier.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the WpBookingly plugin to version 1.3.0 or later, where the vulnerability is patched.

Additionally, ensure that only trusted users have Contributor or Developer privileges, as exploitation requires such access.

Using automated update tools like Patchstack can facilitate rapid protection by applying the necessary patches promptly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart