Vulnerabilities and security researches forecab-taxi-booking-manager ecab-taxi-booking-manager
Direction: ascendingTaxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2024-43986
- CVE, Research URL
- Home page URL
-
Security reports for Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab
- Date
- Aug 29, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Stored XSS.This issue affects Taxi Booking Manager for WooCommerce: through 1.0.9.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-24661
- CVE, Research URL
- Home page URL
-
Security reports for Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab
- Date
- Feb 03, 2025
- Research Description
- Deserialization of Untrusted Data vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Object Injection. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.1.8.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-30839
- CVE, Research URL
- Home page URL
-
Security reports for Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab
- Date
- Mar 27, 2025
- Research Description
- Missing Authorization vulnerability in magepeopleteam Taxi Booking Manager for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.2.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab # CVE-2025-8898
- CVE, Research URL
- Home page URL
-
Security reports for Taxi Booking Manager for WooCommerce – WordPress plugin | Ecab
- Date
- Aug 16, 2025
- Research Description
- The Taxi Booking Manager for Woocommerce | E-cab plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.0. This is due to the plugin not properly validating a user's capabilities prior to updating a plugin setting or their identity prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable