BookingPress Pro Plugin: Critical RCE via Unauthenticated File Upload
The National Vulnerability Database has disclosed CVE-2026-6960, a critical arbitrary file upload vulnerability in the BookingPress Pro plugin for WordPress. Affecting all versions up to and including 5.6, this flaw stems from a lack of file type validation within the bookingpress_validate_submitted_booking_form_func function. This oversight allows unauthenticated attackers to upload arbitrary files to the server.
The critical aspect here is that this vulnerability can lead to remote code execution (RCE). While it requires a custom signature field to be present in the booking form for exploitation, this is a common configuration in many booking systems. The CVSS score of 9.8 (Critical) underscores the severity, indicating a network-exploitable vulnerability with no authentication required, leading to complete compromise of confidentiality, integrity, and availability.
For defenders, this means a direct path to server compromise if the specific conditions are met. Attackers are constantly scanning for plugins like this, especially those with high install bases. The unauthenticated nature of the exploit significantly broadens the attack surface, making it a prime target for automated exploitation. The attacker’s calculus is simple: find an exposed WordPress site with this plugin, confirm the custom field, and gain RCE.
What This Means For You
- If your organization uses the BookingPress Pro plugin for WordPress, you must immediately patch to a version beyond 5.6. Furthermore, audit your booking forms to determine if a signature custom field is in use, as this is a prerequisite for exploitation. Prioritize patching this critical vulnerability to prevent unauthenticated remote code execution on your web servers.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
BookingPress Pro Unauthenticated File Upload - CVE-2026-6960
title: BookingPress Pro Unauthenticated File Upload - CVE-2026-6960
id: scw-2026-05-21-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-6960 by targeting the bookingpress_validate_submitted_booking_form_func AJAX action in the BookingPress Pro WordPress plugin. This action is vulnerable to unauthenticated arbitrary file uploads, potentially leading to remote code execution. This rule specifically looks for the POST request to admin-ajax.php with the relevant action parameter.
author: SCW Feed Engine (AI-generated)
date: 2026-05-21
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-6960/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-method|exact:
- 'POST'
cs-uri-query|contains:
- 'action=bookingpress_validate_submitted_booking_form_func'
# The actual file upload content would be in the request body, which is not directly accessible in standard webserver logs.
# However, the presence of this specific AJAX action and method is highly indicative of the exploit attempt.
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6960 | RCE | BookingPress Pro plugin for WordPress versions <= 5.6 |
| CVE-2026-6960 | Arbitrary File Upload | BookingPress Pro plugin for WordPress, function: 'bookingpress_validate_submitted_booking_form_func' |
| CVE-2026-6960 | Missing File Type Validation | BookingPress Pro plugin for WordPress, requires 'signature custom field' in booking form |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 22, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.