Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13677: CWE-862 Missing Authorization in istmoplugins GetBookingsWP – Appointments Booking Calendar Plugin For WordPress

0
High
VulnerabilityCVE-2024-13677cvecve-2024-13677cwe-862
Published: Tue Feb 18 2025 (02/18/2025, 04:21:19 UTC)
Source: CVE Database V5
Vendor/Project: istmoplugins
Product: GetBookingsWP – Appointments Booking Calendar Plugin For WordPress

Description

CVE-2024-13677 is a high-severity privilege escalation vulnerability in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress. The flaw arises from missing authorization checks when updating user details, allowing authenticated users with subscriber-level access or higher to change arbitrary users' email addresses, including administrators. Attackers can exploit this to reset passwords and take over accounts without requiring user interaction. This vulnerability affects all versions up to and including 1. 1. 27. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality, integrity, and availability make this a critical risk for WordPress sites using this plugin. Organizations should prioritize patching or mitigating this vulnerability promptly to prevent unauthorized account takeovers.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:42:23 UTC

Technical Analysis

CVE-2024-13677 is a vulnerability classified under CWE-862 (Missing Authorization) found in the GetBookingsWP – Appointments Booking Calendar Plugin for WordPress, affecting all versions up to 1.1.27. The vulnerability stems from the plugin's failure to properly validate a user's identity before allowing updates to sensitive user details such as email addresses. Authenticated attackers with subscriber-level privileges or higher can exploit this flaw to modify the email addresses of arbitrary users, including administrators. By changing an administrator's email, the attacker can trigger password reset mechanisms to gain full control over the administrator account, effectively escalating their privileges. The vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The CVSS score of 8.8 reflects a high severity due to the potential for complete compromise of affected WordPress sites. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability's nature suggests it could be leveraged for significant account takeover attacks if weaponized. The flaw impacts confidentiality, integrity, and availability since attackers can fully control administrative accounts, modify site content, and disrupt services.

Potential Impact

The impact of CVE-2024-13677 is significant for organizations using the GetBookingsWP plugin on WordPress sites. Successful exploitation allows attackers to escalate privileges from low-level subscriber accounts to full administrator control, leading to complete site takeover. This compromises confidentiality by exposing sensitive user and site data, integrity by enabling unauthorized content and configuration changes, and availability by potentially disrupting site operations or deploying malicious payloads. Organizations relying on this plugin for appointment booking risk service disruption, reputational damage, and data breaches. The vulnerability also facilitates lateral movement within compromised environments if WordPress admin accounts are reused or linked to other systems. Given WordPress's widespread use globally, the vulnerability poses a broad threat to small businesses, healthcare providers, educational institutions, and other sectors using this plugin for scheduling and customer management.

Mitigation Recommendations

To mitigate CVE-2024-13677, organizations should immediately upgrade the GetBookingsWP plugin to a version that addresses this authorization flaw once available. In the absence of an official patch, administrators should restrict plugin usage to trusted users only and consider disabling or uninstalling the plugin temporarily. Implement strict role-based access controls to limit subscriber-level accounts and monitor for unusual email change requests or password resets. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user detail updates. Regularly audit user accounts for unauthorized changes and enforce multi-factor authentication (MFA) on all administrator accounts to reduce the risk of account takeover. Additionally, review and harden WordPress security configurations, including limiting password reset capabilities and ensuring secure email delivery mechanisms. Finally, maintain comprehensive backups to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T18:27:19.268Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e67b7ef31ef0b5a009e

Added to database: 2/25/2026, 9:49:27 PM

Last enriched: 2/25/2026, 10:42:23 PM

Last updated: 2/26/2026, 7:50:24 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats