Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13447: CWE-862 Missing Authorization in thimpress WP Hotel Booking

0
Medium
VulnerabilityCVE-2024-13447cvecve-2024-13447cwe-862
Published: Wed Jan 22 2025 (01/22/2025, 11:07:58 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: WP Hotel Booking

Description

CVE-2024-13447 is a medium severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 6. The flaw arises from a missing authorization check on the AJAX action hotel_booking_load_order_user, allowing authenticated users with Subscriber-level privileges or higher to access registered user email addresses without proper permission. This vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact data integrity or availability, it compromises confidentiality by exposing user emails. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access controls to prevent unauthorized data disclosure. The vulnerability primarily affects websites running this plugin, which are common in hospitality and booking sectors worldwide, especially in countries with high WordPress adoption and tourism industries. Given the ease of exploitation and the scope of affected systems, the severity is rated medium with a CVSS score of 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:58:35 UTC

Technical Analysis

CVE-2024-13447 is a vulnerability identified in the WP Hotel Booking plugin for WordPress, developed by thimpress. The issue stems from a missing authorization (capability) check on the AJAX action named hotel_booking_load_order_user. This flaw exists in all versions up to and including 2.1.6. Because of this missing check, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to retrieve a list of registered user email addresses. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction, making it relatively easy to exploit remotely. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to enforce proper access control before allowing access to sensitive data. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to confidentiality impact without affecting integrity or availability. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. This vulnerability can lead to privacy violations and potentially facilitate targeted phishing or social engineering attacks by exposing user email addresses. It is particularly relevant for websites in the hospitality sector using this plugin to manage hotel bookings and customer data.

Potential Impact

The primary impact of CVE-2024-13447 is the unauthorized disclosure of registered user email addresses from websites using the WP Hotel Booking plugin. This breach of confidentiality can lead to increased risk of phishing, spam, and social engineering attacks targeting users of affected websites. While the vulnerability does not allow modification or deletion of data, nor does it affect system availability, the exposure of user emails can undermine user trust and violate privacy regulations such as GDPR or CCPA. Organizations relying on this plugin for booking management may face reputational damage and potential legal consequences if user data is mishandled. The ease of exploitation by low-privilege authenticated users increases the risk, especially on sites that allow open registration or have many Subscriber-level accounts. The scope is limited to websites running the vulnerable plugin versions, but given WordPress's widespread use and the popularity of this plugin in the hospitality industry, the number of affected sites could be significant globally.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the WP Hotel Booking plugin to a version where the authorization check is properly implemented once available. Until an official patch is released, administrators should restrict user registration or downgrade user privileges to limit Subscriber-level access where possible. Implementing web application firewall (WAF) rules to monitor and block unauthorized AJAX requests to hotel_booking_load_order_user can reduce exploitation risk. Additionally, reviewing and tightening WordPress user role permissions to minimize unnecessary Subscriber accounts can help. Monitoring logs for unusual access patterns to the AJAX endpoint may provide early detection of exploitation attempts. Educating users about phishing risks and enforcing strong email security policies will mitigate downstream risks from exposed email addresses. Finally, organizations should consider conducting a privacy impact assessment and notify affected users if a data breach is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T22:21:35.957Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e57b7ef31ef0b59e9f3

Added to database: 2/25/2026, 9:49:11 PM

Last enriched: 2/26/2026, 12:58:35 AM

Last updated: 2/26/2026, 7:52:35 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats