CVE-2024-13447: CWE-862 Missing Authorization in thimpress WP Hotel Booking
CVE-2024-13447 is a medium severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 6. The flaw arises from a missing authorization check on the AJAX action hotel_booking_load_order_user, allowing authenticated users with Subscriber-level privileges or higher to access registered user email addresses without proper permission. This vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact data integrity or availability, it compromises confidentiality by exposing user emails. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized data disclosure. The vulnerability primarily affects websites running this plugin, which are common in hospitality and booking sectors worldwide, especially in countries with high WordPress adoption and tourism industries. Given the ease of exploitation and the scope of affected systems, the severity is rated medium with a CVSS score of 4.
AI Analysis
Technical Summary
CVE-2024-13447 is a vulnerability identified in the WP Hotel Booking plugin for WordPress, developed by thimpress. The issue stems from a missing authorization (capability) check on the AJAX action named hotel_booking_load_order_user. This flaw exists in all versions up to and including 2.1.6. Because of this missing check, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to retrieve a list of registered user email addresses. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction, making it relatively easy to exploit remotely. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access control before allowing access to sensitive data. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to confidentiality impact without affecting integrity or availability. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. This vulnerability can lead to privacy violations and potentially facilitate targeted phishing or social engineering attacks by exposing user email addresses. It is particularly relevant for websites in the hospitality sector using this plugin to manage hotel bookings and customer data.
Potential Impact
The primary impact of CVE-2024-13447 is the unauthorized disclosure of registered user email addresses from websites using the WP Hotel Booking plugin. This breach of confidentiality can lead to increased risk of phishing, spam, and social engineering attacks targeting users of affected websites. While the vulnerability does not allow modification or deletion of data, nor does it affect system availability, the exposure of user emails can undermine user trust and violate privacy regulations such as GDPR or CCPA. Organizations relying on this plugin for booking management may face reputational damage and potential legal consequences if user data is mishandled. The ease of exploitation by low-privilege authenticated users increases the risk, especially on sites that allow open registration or have many Subscriber-level accounts. The scope is limited to websites running the vulnerable plugin versions, but given WordPress's widespread use and the popularity of this plugin in the hospitality industry, the number of affected sites could be significant globally.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WP Hotel Booking plugin to a version where the authorization check is properly implemented once available. Until an official patch is released, administrators should restrict user registration or downgrade user privileges to limit Subscriber-level access where possible. Implementing web application firewall (WAF) rules to monitor and block unauthorized AJAX requests to hotel_booking_load_order_user can reduce exploitation risk. Additionally, reviewing and tightening WordPress user role permissions to minimize unnecessary Subscriber accounts can help. Monitoring logs for unusual access patterns to the AJAX endpoint may provide early detection of exploitation attempts. Educating users about phishing risks and enforcing strong email security policies will mitigate downstream risks from exposed email addresses. Finally, organizations should consider conducting a privacy impact assessment and notify affected users if a data breach is suspected.
Affected Countries
United States, United Kingdom, Germany, France, Australia, Canada, India, Brazil, Japan, Italy, Spain, Netherlands
CVE-2024-13447: CWE-862 Missing Authorization in thimpress WP Hotel Booking
Description
CVE-2024-13447 is a medium severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 6. The flaw arises from a missing authorization check on the AJAX action hotel_booking_load_order_user, allowing authenticated users with Subscriber-level privileges or higher to access registered user email addresses without proper permission. This vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact data integrity or availability, it compromises confidentiality by exposing user emails. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized data disclosure. The vulnerability primarily affects websites running this plugin, which are common in hospitality and booking sectors worldwide, especially in countries with high WordPress adoption and tourism industries. Given the ease of exploitation and the scope of affected systems, the severity is rated medium with a CVSS score of 4.
AI-Powered Analysis
Technical Analysis
CVE-2024-13447 is a vulnerability identified in the WP Hotel Booking plugin for WordPress, developed by thimpress. The issue stems from a missing authorization (capability) check on the AJAX action named hotel_booking_load_order_user. This flaw exists in all versions up to and including 2.1.6. Because of this missing check, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to retrieve a list of registered user email addresses. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction, making it relatively easy to exploit remotely. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access control before allowing access to sensitive data. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to confidentiality impact without affecting integrity or availability. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. This vulnerability can lead to privacy violations and potentially facilitate targeted phishing or social engineering attacks by exposing user email addresses. It is particularly relevant for websites in the hospitality sector using this plugin to manage hotel bookings and customer data.
Potential Impact
The primary impact of CVE-2024-13447 is the unauthorized disclosure of registered user email addresses from websites using the WP Hotel Booking plugin. This breach of confidentiality can lead to increased risk of phishing, spam, and social engineering attacks targeting users of affected websites. While the vulnerability does not allow modification or deletion of data, nor does it affect system availability, the exposure of user emails can undermine user trust and violate privacy regulations such as GDPR or CCPA. Organizations relying on this plugin for booking management may face reputational damage and potential legal consequences if user data is mishandled. The ease of exploitation by low-privilege authenticated users increases the risk, especially on sites that allow open registration or have many Subscriber-level accounts. The scope is limited to websites running the vulnerable plugin versions, but given WordPress's widespread use and the popularity of this plugin in the hospitality industry, the number of affected sites could be significant globally.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WP Hotel Booking plugin to a version where the authorization check is properly implemented once available. Until an official patch is released, administrators should restrict user registration or downgrade user privileges to limit Subscriber-level access where possible. Implementing web application firewall (WAF) rules to monitor and block unauthorized AJAX requests to hotel_booking_load_order_user can reduce exploitation risk. Additionally, reviewing and tightening WordPress user role permissions to minimize unnecessary Subscriber accounts can help. Monitoring logs for unusual access patterns to the AJAX endpoint may provide early detection of exploitation attempts. Educating users about phishing risks and enforcing strong email security policies will mitigate downstream risks from exposed email addresses. Finally, organizations should consider conducting a privacy impact assessment and notify affected users if a data breach is suspected.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-15T22:21:35.957Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e57b7ef31ef0b59e9f3
Added to database: 2/25/2026, 9:49:11 PM
Last enriched: 2/26/2026, 12:58:35 AM
Last updated: 2/26/2026, 7:52:35 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.