Description
WordPress Plugin Sagenda-Free booking system is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to delete files that the current user has access to. WordPress Plugin Sagenda-Free booking system version 1.3.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.3 or latest
References
Related Vulnerabilities
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.9.4)
Python Improper Restriction of XML External Entity Reference Vulnerability (CVE-2017-9233)
WordPress Plugin WP Ultimate Exporter Cross-Site Scripting (1.0)
WordPress Plugin Extra User Details Privilege Escalation (0.4.2)
Jenkins Improper Restriction of Rendered UI Layers or Frames Vulnerability (CVE-2020-2105)