Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin
On June 8th, 2025, we received a submission through our Bug Bounty Program for an Authentication Bypass vulnerability in Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. This theme has been sold to approximately 6,000 customers. This vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts with the ‘administrator’ role. The vendor released the patched version on July 17, 2025, and we publicly disclosed this vulnerability on July 31, 2025.
AI Analysis
Technical Summary
The Service Finder Bookings plugin, a component bundled with the Service Finder WordPress theme, contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain access to any user account on a compromised WordPress site, including those with administrator privileges. This vulnerability was identified through a bug bounty submission on June 8, 2025. The theme has been sold to approximately 6,000 customers, indicating a moderate but significant attack surface. The flaw effectively bypasses normal authentication mechanisms, enabling attackers to impersonate any user without credentials. This can lead to full site takeover, including the ability to modify content, install malicious plugins, exfiltrate data, or pivot to other network assets. The vendor released a patch on July 17, 2025, and the vulnerability was publicly disclosed on July 31, 2025. Indicators of compromise include several IP addresses linked to exploitation attempts. Although no confirmed widespread exploitation is reported, active attempts have been detected, highlighting the urgency for patching. The vulnerability is tagged with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter), T1506 (Resource Hijacking), and T1078 (Valid Accounts), indicating potential attacker behaviors post-compromise. The absence of a CVE or CVSS score necessitates an independent severity assessment. The vulnerability impacts confidentiality, integrity, and availability, with no authentication or user interaction required, making it highly exploitable.
Potential Impact
For European organizations, this vulnerability presents a significant risk due to the widespread use of WordPress for business websites, including e-commerce, service booking, and informational portals. Compromise of administrator accounts can lead to complete site control, data breaches involving customer or business data, defacement, ransomware deployment, or use of the site as a pivot point for further network intrusion. Small and medium enterprises (SMEs), which often rely on bundled themes and plugins without extensive security oversight, are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruption. Given the plugin’s moderate market penetration, the threat is non-trivial and could affect sectors such as hospitality, professional services, and local commerce across Europe. The exploitation could also facilitate supply chain attacks if compromised sites serve as distribution points for malware or phishing campaigns. The presence of attacker IPs from various regions suggests a broad interest in targeting these vulnerabilities, increasing the likelihood of attacks against European targets.
Mitigation Recommendations
1. Immediate application of the vendor’s patch released on July 17, 2025, is critical to close the authentication bypass vulnerability. 2. Conduct a thorough audit of all user accounts on affected WordPress sites to detect unauthorized access or creation of new administrator accounts. 3. Review and harden WordPress security configurations, including limiting plugin/theme installations to trusted sources and disabling unused plugins/themes. 4. Implement multi-factor authentication (MFA) for all administrator accounts to mitigate risks from compromised credentials. 5. Monitor web server and application logs for suspicious activity, especially login attempts from the identified attacker IP addresses and unusual administrative actions. 6. Employ web application firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting this vulnerability. 7. Educate site administrators on the risks of using outdated plugins and the importance of timely updates. 8. Consider isolating critical WordPress instances and backing up data regularly to enable rapid recovery in case of compromise. 9. Engage in threat intelligence sharing with industry peers and cybersecurity communities to stay informed about emerging exploitation tactics related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
Indicators of Compromise
- ip: 5.189.221.98
- ip: 185.109.21.157
- ip: 192.121.16.196
- ip: 194.68.32.71
- ip: 178.125.204.198
Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin
Description
On June 8th, 2025, we received a submission through our Bug Bounty Program for an Authentication Bypass vulnerability in Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. This theme has been sold to approximately 6,000 customers. This vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts with the ‘administrator’ role. The vendor released the patched version on July 17, 2025, and we publicly disclosed this vulnerability on July 31, 2025.
AI-Powered Analysis
Technical Analysis
The Service Finder Bookings plugin, a component bundled with the Service Finder WordPress theme, contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain access to any user account on a compromised WordPress site, including those with administrator privileges. This vulnerability was identified through a bug bounty submission on June 8, 2025. The theme has been sold to approximately 6,000 customers, indicating a moderate but significant attack surface. The flaw effectively bypasses normal authentication mechanisms, enabling attackers to impersonate any user without credentials. This can lead to full site takeover, including the ability to modify content, install malicious plugins, exfiltrate data, or pivot to other network assets. The vendor released a patch on July 17, 2025, and the vulnerability was publicly disclosed on July 31, 2025. Indicators of compromise include several IP addresses linked to exploitation attempts. Although no confirmed widespread exploitation is reported, active attempts have been detected, highlighting the urgency for patching. The vulnerability is tagged with MITRE ATT&CK techniques such as T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter), T1506 (Resource Hijacking), and T1078 (Valid Accounts), indicating potential attacker behaviors post-compromise. The absence of a CVE or CVSS score necessitates an independent severity assessment. The vulnerability impacts confidentiality, integrity, and availability, with no authentication or user interaction required, making it highly exploitable.
Potential Impact
For European organizations, this vulnerability presents a significant risk due to the widespread use of WordPress for business websites, including e-commerce, service booking, and informational portals. Compromise of administrator accounts can lead to complete site control, data breaches involving customer or business data, defacement, ransomware deployment, or use of the site as a pivot point for further network intrusion. Small and medium enterprises (SMEs), which often rely on bundled themes and plugins without extensive security oversight, are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruption. Given the plugin’s moderate market penetration, the threat is non-trivial and could affect sectors such as hospitality, professional services, and local commerce across Europe. The exploitation could also facilitate supply chain attacks if compromised sites serve as distribution points for malware or phishing campaigns. The presence of attacker IPs from various regions suggests a broad interest in targeting these vulnerabilities, increasing the likelihood of attacks against European targets.
Mitigation Recommendations
1. Immediate application of the vendor’s patch released on July 17, 2025, is critical to close the authentication bypass vulnerability. 2. Conduct a thorough audit of all user accounts on affected WordPress sites to detect unauthorized access or creation of new administrator accounts. 3. Review and harden WordPress security configurations, including limiting plugin/theme installations to trusted sources and disabling unused plugins/themes. 4. Implement multi-factor authentication (MFA) for all administrator accounts to mitigate risks from compromised credentials. 5. Monitor web server and application logs for suspicious activity, especially login attempts from the identified attacker IP addresses and unusual administrative actions. 6. Employ web application firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting this vulnerability. 7. Educate site administrators on the risks of using outdated plugins and the importance of timely updates. 8. Consider isolating critical WordPress instances and backing up data regularly to enable rapid recovery in case of compromise. 9. Engage in threat intelligence sharing with industry peers and cybersecurity communities to stay informed about emerging exploitation tactics related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wordfence.com/blog/2025/10/attackers-actively-exploiting-critical-vulnerability-in-service-finder-bookings-plugin/"]
- Adversary
- null
- Pulse Id
- 68e7e8b4e4ba51db6e3330ef
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip5.189.221.98 | — | |
ip185.109.21.157 | — | |
ip192.121.16.196 | — | |
ip194.68.32.71 | — | |
ip178.125.204.198 | — |
Threat ID: 68e7ebe2ba0e608b4fa3ca04
Added to database: 10/9/2025, 5:07:46 PM
Last enriched: 10/9/2025, 5:23:23 PM
Last updated: 11/24/2025, 1:36:14 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
HighCritical 7 Zip Vulnerability With Public Exploit Requires Manual Update
CriticalCISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
CriticalNew Tools and Techniques of ToddyCat APT
MediumAnalysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.