Home

Description

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

PUBLISHED Reserved 2026-04-14 | Published 2026-05-02 | Updated 2026-05-04 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-01:Disclosed

Credits

daroo finder

References

www.wordfence.com/...-e1c7-4989-82db-20e255b52854?source=cve

plugins.trac.wordpress.org/...t/3512110/salon-booking-system

cve.org (CVE-2026-6320)

nvd.nist.gov (CVE-2026-6320)

Download JSON