ReDi Restaurant Reservation

Information

Software Type Plugin
Software Slug redi-restaurant-reservation (view on wordpress.org)
Software Status Active
Software Author thecatkin
Software Website landing.reservationdiary.eu
Software Downloads 78,504
Software Active Installs 1,000
Software Record Last Updated November 23, 2024

7 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
ReDi Restaurant Reservation <= 21.0307 - Stored Cross-Site Scripting Patched CVE-2021-24299 7.2 Bastijn Ouwendijk May 9, 2021
ReDi Restaurant Reservation <= 24.0902 - Reflected Cross-Site Scripting Patched CVE-2024-9240 6.1 vgo0 October 16, 2024
ReDi Restaurant Reservation <= 24.0128 - Reflected Cross-Site Scripting Patched CVE-2024-29806 6.1 Le Ngoc Anh March 25, 2024
ReDi Restaurant Reservation <= 24.0422 - Missing Authorization Patched CVE-2024-38737 5.3 Ananda Dhakal July 11, 2024
ReDi Restaurant Reservation <= 23.0211 - Missing Authorization Patched CVE-2023-36510 5.3 Abdi Pranata June 22, 2023
ReDi Restaurant Reservation <= 24.0128 - Cross-Site Request Forgery via redi_restaurant_admin_options_page() Patched CVE-2024-31385 4.3 Joshua Chan April 10, 2024
ReDi Restaurant Reservation <= 24.0128 - Cross-Site Request Forgery via redi_restaurant_admin_options_page() Patched CVE-2024-31299 4.3 Majed Refaea April 5, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation