Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12370: CWE-284 Improper Access Control in thimpress WP Hotel Booking

0
Medium
VulnerabilityCVE-2024-12370cvecve-2024-12370cwe-284
Published: Fri Jan 17 2025 (01/17/2025, 08:25:38 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: WP Hotel Booking

Description

CVE-2024-12370 is a medium severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 5. It arises from improper access control (CWE-284) due to a missing capability check when adding rooms. This flaw allows unauthenticated attackers to add rooms with custom prices, potentially manipulating booking data without authorization. The vulnerability does not impact confidentiality or availability but compromises data integrity. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data modification. Countries with significant WordPress usage and tourism-related businesses are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:13:56 UTC

Technical Analysis

CVE-2024-12370 is an improper access control vulnerability identified in the WP Hotel Booking plugin for WordPress, developed by thimpress. The vulnerability exists in all versions up to and including 2.1.5. The root cause is a missing capability check when adding rooms, which means the plugin fails to verify whether the user has the necessary permissions before allowing the addition of new rooms with custom prices. This flaw allows unauthenticated attackers—meaning no login or credentials are required—to remotely add rooms to the booking system. The attack vector is network-based and requires no user interaction, making exploitation relatively straightforward. The vulnerability is classified under CWE-284, which pertains to improper access control, and has a CVSS v3.1 base score of 5.3 (medium severity). The CVSS vector indicates no impact on confidentiality or availability but a low impact on integrity, as attackers can alter booking data by adding unauthorized rooms. There are no patches or updates currently linked, and no known exploits have been observed in the wild. This vulnerability poses a risk to the integrity of hotel booking data, potentially leading to fraudulent bookings, pricing manipulation, or disruption of business operations relying on accurate room inventory.

Potential Impact

The primary impact of CVE-2024-12370 is on data integrity within the WP Hotel Booking plugin. Unauthorized addition of rooms with custom prices can lead to fraudulent bookings, financial losses, and reputational damage for affected organizations. Attackers could manipulate room availability and pricing, potentially confusing customers or causing revenue leakage. While confidentiality and availability are not directly affected, the integrity compromise can disrupt business processes and trust in the booking system. Organizations relying on this plugin for managing hotel room inventory and pricing are at risk of operational disruption and financial fraud. The ease of exploitation—no authentication or user interaction required—raises the likelihood of automated attacks targeting vulnerable sites. This threat is particularly relevant for businesses in the hospitality and tourism sectors using WordPress with the WP Hotel Booking plugin.

Mitigation Recommendations

To mitigate CVE-2024-12370, organizations should immediately verify if they are using the WP Hotel Booking plugin version 2.1.5 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should implement the following specific measures: 1) Restrict access to the plugin’s room management endpoints by configuring web application firewalls (WAFs) or server-level access controls to allow only trusted IP addresses or authenticated users. 2) Employ WordPress security plugins that can enforce capability checks or monitor unauthorized changes to booking data. 3) Regularly audit booking data for anomalies such as unexpected room additions or pricing changes. 4) Disable or remove the WP Hotel Booking plugin if it is not essential to reduce attack surface. 5) Monitor logs for suspicious POST requests targeting room addition functions. 6) Engage with the plugin vendor or community to track patch releases and apply updates promptly. These targeted actions go beyond generic advice by focusing on access restriction, monitoring, and proactive auditing tailored to this vulnerability’s characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-09T16:34:30.012Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e38b7ef31ef0b597fd3

Added to database: 2/25/2026, 9:48:40 PM

Last enriched: 2/26/2026, 5:13:56 AM

Last updated: 2/26/2026, 8:04:04 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats