Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin

0
Medium
Published: Thu Oct 09 2025 (10/09/2025, 16:54:10 UTC)
Source: AlienVault OTX General

Description

A critical authentication bypass vulnerability was discovered in the Service Finder Bookings WordPress plugin, bundled with the Service Finder theme used by approximately 6,000 customers. This flaw allows unauthenticated attackers to access any user account on affected sites, including administrator accounts, potentially leading to full site compromise. The vulnerability was reported on June 8, 2025, patched by the vendor on July 17, 2025, and publicly disclosed on July 31, 2025. Despite the patch, active exploitation attempts have been observed, though no confirmed widespread exploits are reported yet. The vulnerability poses significant risks to confidentiality, integrity, and availability of affected WordPress sites. European organizations using this plugin are at risk, especially those with high-value or sensitive data. Mitigation requires immediate patching, auditing user accounts, and monitoring for suspicious activity. Countries with high WordPress usage and significant small-to-medium business sectors are most likely affected. Given the ease of exploitation without authentication and the potential for full administrative access, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 10/09/2025, 17:23:23 UTC

Technical Analysis

The Service Finder Bookings plugin, a component bundled with the Service Finder WordPress theme, contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain access to any user account on a compromised WordPress site, including those with administrator privileges. This vulnerability was identified through a bug bounty submission on June 8, 2025. The theme has been sold to approximately 6,000 customers, indicating a moderate but significant attack surface. The flaw effectively bypasses normal authentication mechanisms, enabling attackers to impersonate any user without credentials. This can lead to full site takeover, including the ability to modify content, install malicious plugins, exfiltrate data, or pivot to other network assets. The vendor released a patch on July 17, 2025, and the vulnerability was publicly disclosed on July 31, 2025. Indicators of compromise include several IP addresses linked to exploitation attempts. Although no confirmed widespread exploitation is reported, active attempts have been detected, highlighting the urgency for patching. The vulnerability is tagged with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter), T1506 (Resource Hijacking), and T1078 (Valid Accounts), indicating potential attacker behaviors post-compromise. The absence of a CVE or CVSS score necessitates an independent severity assessment. The vulnerability impacts confidentiality, integrity, and availability, with no authentication or user interaction required, making it highly exploitable.

Potential Impact

For European organizations, this vulnerability presents a significant risk due to the widespread use of WordPress for business websites, including e-commerce, service booking, and informational portals. Compromise of administrator accounts can lead to complete site control, data breaches involving customer or business data, defacement, ransomware deployment, or use of the site as a pivot point for further network intrusion. Small and medium enterprises (SMEs), which often rely on bundled themes and plugins without extensive security oversight, are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruption. Given the plugin’s moderate market penetration, the threat is non-trivial and could affect sectors such as hospitality, professional services, and local commerce across Europe. The exploitation could also facilitate supply chain attacks if compromised sites serve as distribution points for malware or phishing campaigns. The presence of attacker IPs from various regions suggests a broad interest in targeting these vulnerabilities, increasing the likelihood of attacks against European targets.

Mitigation Recommendations

1. Immediate application of the vendor’s patch released on July 17, 2025, is critical to close the authentication bypass vulnerability. 2. Conduct a thorough audit of all user accounts on affected WordPress sites to detect unauthorized access or creation of new administrator accounts. 3. Review and harden WordPress security configurations, including limiting plugin/theme installations to trusted sources and disabling unused plugins/themes. 4. Implement multi-factor authentication (MFA) for all administrator accounts to mitigate risks from compromised credentials. 5. Monitor web server and application logs for suspicious activity, especially login attempts from the identified attacker IP addresses and unusual administrative actions. 6. Employ web application firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting this vulnerability. 7. Educate site administrators on the risks of using outdated plugins and the importance of timely updates. 8. Consider isolating critical WordPress instances and backing up data regularly to enable rapid recovery in case of compromise. 9. Engage in threat intelligence sharing with industry peers and cybersecurity communities to stay informed about emerging exploitation tactics related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wordfence.com/blog/2025/10/attackers-actively-exploiting-critical-vulnerability-in-service-finder-bookings-plugin/"]
Adversary
null
Pulse Id
68e7e8b4e4ba51db6e3330ef
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip5.189.221.98
ip185.109.21.157
ip192.121.16.196
ip194.68.32.71
ip178.125.204.198

Threat ID: 68e7ebe2ba0e608b4fa3ca04

Added to database: 10/9/2025, 5:07:46 PM

Last enriched: 10/9/2025, 5:23:23 PM

Last updated: 10/10/2025, 12:33:25 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats