Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin

0
Medium
Published: Thu Oct 09 2025 (10/09/2025, 16:54:10 UTC)
Source: AlienVault OTX General

Description

On June 8th, 2025, we received a submission through our Bug Bounty Program for an Authentication Bypass vulnerability in Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. This theme has been sold to approximately 6,000 customers. This vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts with the ‘administrator’ role. The vendor released the patched version on July 17, 2025, and we publicly disclosed this vulnerability on July 31, 2025.

AI-Powered Analysis

AILast updated: 10/09/2025, 17:23:23 UTC

Technical Analysis

The Service Finder Bookings plugin, a component bundled with the Service Finder WordPress theme, contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain access to any user account on a compromised WordPress site, including those with administrator privileges. This vulnerability was identified through a bug bounty submission on June 8, 2025. The theme has been sold to approximately 6,000 customers, indicating a moderate but significant attack surface. The flaw effectively bypasses normal authentication mechanisms, enabling attackers to impersonate any user without credentials. This can lead to full site takeover, including the ability to modify content, install malicious plugins, exfiltrate data, or pivot to other network assets. The vendor released a patch on July 17, 2025, and the vulnerability was publicly disclosed on July 31, 2025. Indicators of compromise include several IP addresses linked to exploitation attempts. Although no confirmed widespread exploitation is reported, active attempts have been detected, highlighting the urgency for patching. The vulnerability is tagged with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter), T1506 (Resource Hijacking), and T1078 (Valid Accounts), indicating potential attacker behaviors post-compromise. The absence of a CVE or CVSS score necessitates an independent severity assessment. The vulnerability impacts confidentiality, integrity, and availability, with no authentication or user interaction required, making it highly exploitable.

Potential Impact

For European organizations, this vulnerability presents a significant risk due to the widespread use of WordPress for business websites, including e-commerce, service booking, and informational portals. Compromise of administrator accounts can lead to complete site control, data breaches involving customer or business data, defacement, ransomware deployment, or use of the site as a pivot point for further network intrusion. Small and medium enterprises (SMEs), which often rely on bundled themes and plugins without extensive security oversight, are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruption. Given the plugin’s moderate market penetration, the threat is non-trivial and could affect sectors such as hospitality, professional services, and local commerce across Europe. The exploitation could also facilitate supply chain attacks if compromised sites serve as distribution points for malware or phishing campaigns. The presence of attacker IPs from various regions suggests a broad interest in targeting these vulnerabilities, increasing the likelihood of attacks against European targets.

Mitigation Recommendations

1. Immediate application of the vendor’s patch released on July 17, 2025, is critical to close the authentication bypass vulnerability. 2. Conduct a thorough audit of all user accounts on affected WordPress sites to detect unauthorized access or creation of new administrator accounts. 3. Review and harden WordPress security configurations, including limiting plugin/theme installations to trusted sources and disabling unused plugins/themes. 4. Implement multi-factor authentication (MFA) for all administrator accounts to mitigate risks from compromised credentials. 5. Monitor web server and application logs for suspicious activity, especially login attempts from the identified attacker IP addresses and unusual administrative actions. 6. Employ web application firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting this vulnerability. 7. Educate site administrators on the risks of using outdated plugins and the importance of timely updates. 8. Consider isolating critical WordPress instances and backing up data regularly to enable rapid recovery in case of compromise. 9. Engage in threat intelligence sharing with industry peers and cybersecurity communities to stay informed about emerging exploitation tactics related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wordfence.com/blog/2025/10/attackers-actively-exploiting-critical-vulnerability-in-service-finder-bookings-plugin/"]
Adversary
null
Pulse Id
68e7e8b4e4ba51db6e3330ef
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip5.189.221.98
ip185.109.21.157
ip192.121.16.196
ip194.68.32.71
ip178.125.204.198

Threat ID: 68e7ebe2ba0e608b4fa3ca04

Added to database: 10/9/2025, 5:07:46 PM

Last enriched: 10/9/2025, 5:23:23 PM

Last updated: 11/24/2025, 1:36:14 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats