cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forecab-taxi-booking-manager ecab-taxi-booking-manager

Direction: ascending
Aug 31, 2024

Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2024-43986

CVE, Research URL

CVE-2024-43986

Date
Aug 29, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Stored XSS.This issue affects Taxi Booking Manager for WooCommerce: through 1.0.9.
Affected versions
Min -, max -.
Status
vulnerable
Feb 05, 2025

Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-24661

CVE, Research URL

CVE-2025-24661

Date
Feb 03, 2025
Research Description
Deserialization of Untrusted Data vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Object Injection. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.1.8.
Affected versions
Min -, max -.
Status
vulnerable
Apr 02, 2025

Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-30839

CVE, Research URL

CVE-2025-30839

Date
Mar 27, 2025
Research Description
Missing Authorization vulnerability in magepeopleteam Taxi Booking Manager for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.2.1.
Affected versions
Min -, max -.
Status
vulnerable
Aug 16, 2025

Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-8898

CVE, Research URL

CVE-2025-8898

Date
Aug 16, 2025
Research Description
The Taxi Booking Manager for Woocommerce | E-cab plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.0. This is due to the plugin not properly validating a user's capabilities prior to updating a plugin setting or their identity prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Affected versions
Min -, max -.
Status
vulnerable