CVE-2024-13677: CWE-862 Missing Authorization in istmoplugins GetBookingsWP – Appointments Booking Calendar Plugin For WordPress
CVE-2024-13677 is a high-severity privilege escalation vulnerability in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress. The flaw arises from missing authorization checks when updating user details, allowing authenticated users with subscriber-level access or higher to change arbitrary users' email addresses, including administrators. Attackers can exploit this to reset passwords and take over accounts without requiring user interaction. This vulnerability affects all versions up to and including 1. 1. 27. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality, integrity, and availability make this a critical risk for WordPress sites using this plugin. Organizations should prioritize patching or mitigating this vulnerability promptly to prevent unauthorized account takeovers.
AI Analysis
Technical Summary
CVE-2024-13677 is a vulnerability classified under CWE-862 (Missing Authorization) found in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress, affecting all versions up to 1.1.27. The vulnerability stems from the plugin's failure to properly validate a user's identity before allowing updates to sensitive user details such as email addresses. Authenticated attackers with subscriber-level privileges or higher can exploit this flaw to modify the email addresses of arbitrary users, including administrators. By changing an administrator's email, the attacker can trigger password reset mechanisms to gain full control over the administrator account, effectively escalating their privileges. The vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The CVSS score of 8.8 reflects a high severity due to the potential for complete compromise of affected WordPress sites. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability's nature suggests it could be leveraged for significant account takeover attacks if weaponized. The flaw impacts confidentiality, integrity, and availability since attackers can fully control administrative accounts, modify site content, and disrupt services.
Potential Impact
The impact of CVE-2024-13677 is significant for organizations using the GetBookingsWP plugin on WordPress sites. Successful exploitation allows attackers to escalate privileges from low-level subscriber accounts to full administrator control, leading to complete site takeover. This compromises confidentiality by exposing sensitive user and site data, integrity by enabling unauthorized content and configuration changes, and availability by potentially disrupting site operations or deploying malicious payloads. Organizations relying on this plugin for appointment booking risk service disruption, reputational damage, and data breaches. The vulnerability also facilitates lateral movement within compromised environments if WordPress admin accounts are reused or linked to other systems. Given WordPress's widespread use globally, the vulnerability poses a broad threat to small businesses, healthcare providers, educational institutions, and other sectors using this plugin for scheduling and customer management.
Mitigation Recommendations
To mitigate CVE-2024-13677, organizations should immediately upgrade the GetBookingsWP plugin to a version that addresses this authorization flaw once available. In the absence of an official patch, administrators should restrict plugin usage to trusted users only and consider disabling or uninstalling the plugin temporarily. Implement strict role-based access controls to limit subscriber-level accounts and monitor for unusual email change requests or password resets. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user detail updates. Regularly audit user accounts for unauthorized changes and enforce multi-factor authentication (MFA) on all administrator accounts to reduce the risk of account takeover. Additionally, review and harden WordPress security configurations, including limiting password reset capabilities and ensuring secure email delivery mechanisms. Finally, maintain comprehensive backups to enable rapid recovery in case of compromise.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13677: CWE-862 Missing Authorization in istmoplugins GetBookingsWP – Appointments Booking Calendar Plugin For WordPress
Description
CVE-2024-13677 is a high-severity privilege escalation vulnerability in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress. The flaw arises from missing authorization checks when updating user details, allowing authenticated users with subscriber-level access or higher to change arbitrary users' email addresses, including administrators. Attackers can exploit this to reset passwords and take over accounts without requiring user interaction. This vulnerability affects all versions up to and including 1. 1. 27. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality, integrity, and availability make this a critical risk for WordPress sites using this plugin. Organizations should prioritize patching or mitigating this vulnerability promptly to prevent unauthorized account takeovers.
AI-Powered Analysis
Technical Analysis
CVE-2024-13677 is a vulnerability classified under CWE-862 (Missing Authorization) found in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress, affecting all versions up to 1.1.27. The vulnerability stems from the plugin's failure to properly validate a user's identity before allowing updates to sensitive user details such as email addresses. Authenticated attackers with subscriber-level privileges or higher can exploit this flaw to modify the email addresses of arbitrary users, including administrators. By changing an administrator's email, the attacker can trigger password reset mechanisms to gain full control over the administrator account, effectively escalating their privileges. The vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The CVSS score of 8.8 reflects a high severity due to the potential for complete compromise of affected WordPress sites. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability's nature suggests it could be leveraged for significant account takeover attacks if weaponized. The flaw impacts confidentiality, integrity, and availability since attackers can fully control administrative accounts, modify site content, and disrupt services.
Potential Impact
The impact of CVE-2024-13677 is significant for organizations using the GetBookingsWP plugin on WordPress sites. Successful exploitation allows attackers to escalate privileges from low-level subscriber accounts to full administrator control, leading to complete site takeover. This compromises confidentiality by exposing sensitive user and site data, integrity by enabling unauthorized content and configuration changes, and availability by potentially disrupting site operations or deploying malicious payloads. Organizations relying on this plugin for appointment booking risk service disruption, reputational damage, and data breaches. The vulnerability also facilitates lateral movement within compromised environments if WordPress admin accounts are reused or linked to other systems. Given WordPress's widespread use globally, the vulnerability poses a broad threat to small businesses, healthcare providers, educational institutions, and other sectors using this plugin for scheduling and customer management.
Mitigation Recommendations
To mitigate CVE-2024-13677, organizations should immediately upgrade the GetBookingsWP plugin to a version that addresses this authorization flaw once available. In the absence of an official patch, administrators should restrict plugin usage to trusted users only and consider disabling or uninstalling the plugin temporarily. Implement strict role-based access controls to limit subscriber-level accounts and monitor for unusual email change requests or password resets. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user detail updates. Regularly audit user accounts for unauthorized changes and enforce multi-factor authentication (MFA) on all administrator accounts to reduce the risk of account takeover. Additionally, review and harden WordPress security configurations, including limiting password reset capabilities and ensuring secure email delivery mechanisms. Finally, maintain comprehensive backups to enable rapid recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T18:27:19.268Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e67b7ef31ef0b5a009e
Added to database: 2/25/2026, 9:49:27 PM
Last enriched: 2/25/2026, 10:42:23 PM
Last updated: 2/26/2026, 7:50:24 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.