Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13746: CWE-862 Missing Authorization in imznarf Booking Calendar and Notification

0
Medium
VulnerabilityCVE-2024-13746cvecve-2024-13746cwe-862
Published: Sat Mar 01 2025 (03/01/2025, 04:21:48 UTC)
Source: CVE Database V5
Vendor/Project: imznarf
Product: Booking Calendar and Notification

Description

CVE-2024-13746 is a medium severity vulnerability in the imznarf Booking Calendar and Notification WordPress plugin, affecting all versions up to 4. 0. 3. The flaw arises from missing authorization checks in key functions, allowing unauthenticated attackers to access, modify, or delete booking data and arbitrary posts. Exploitation requires no user interaction or privileges, making it remotely exploitable over the network. While no known exploits are currently reported in the wild, the vulnerability poses risks to confidentiality and integrity of booking data. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data manipulation. The vulnerability primarily impacts websites using this plugin, which may be more prevalent in countries with high WordPress adoption and e-commerce or booking services. Given the CVSS score of 6. 5, the threat is medium severity but should not be ignored due to the ease of exploitation and potential data exposure.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:15:21 UTC

Technical Analysis

CVE-2024-13746 is a vulnerability identified in the imznarf Booking Calendar and Notification plugin for WordPress, affecting all versions up to and including 4.0.3. The root cause is missing authorization (CWE-862) in three critical functions: wpcb_all_bookings(), wpcb_update_booking_post(), and wpcb_delete_posts(). These functions lack proper capability checks, allowing unauthenticated attackers to remotely invoke them without any privileges or user interaction. As a result, attackers can extract booking data, create or update bookings, or delete arbitrary posts on the affected WordPress sites. The vulnerability is remotely exploitable over the network (AV:N), requires no authentication (PR:N), and no user interaction (UI:N), which increases its risk profile. The impact primarily affects confidentiality and integrity, as attackers can access sensitive booking information and manipulate or delete data, but availability is not significantly impacted. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on January 27, 2025, and published on March 1, 2025, with a CVSS 3.1 base score of 6.5, indicating medium severity.

Potential Impact

The vulnerability allows unauthorized attackers to access sensitive booking data, potentially exposing personal or business information, which can lead to privacy violations and reputational damage. Attackers can also create or modify bookings, which could disrupt business operations, cause financial loss, or lead to fraudulent activities. The ability to delete arbitrary posts further risks data integrity and content availability, potentially affecting website functionality and user trust. Organizations relying on this plugin for booking management may face operational disruptions and data breaches if exploited. Since the vulnerability requires no authentication and no user interaction, it can be exploited by automated tools or remote attackers scanning for vulnerable sites, increasing the likelihood of widespread abuse. The absence of known exploits in the wild currently limits immediate impact, but the ease of exploitation and the critical nature of booking data make this a significant risk for affected sites.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the Booking Calendar and Notification plugin until a patch is available. 2. Monitor official vendor channels and WordPress plugin repositories for updates or patches addressing this vulnerability. 3. Implement web application firewall (WAF) rules to block or restrict access to the vulnerable plugin’s endpoints, especially the functions wpcb_all_bookings(), wpcb_update_booking_post(), and wpcb_delete_posts(). 4. Restrict access to the WordPress admin area and plugin endpoints by IP whitelisting or VPN access where feasible. 5. Conduct regular audits of booking data and posts to detect unauthorized changes or deletions. 6. Employ intrusion detection systems (IDS) to monitor for suspicious activity targeting the plugin’s functions. 7. Educate site administrators on the risks of using outdated plugins and the importance of timely updates. 8. Consider alternative booking plugins with verified security postures if immediate patching is not possible. These steps go beyond generic advice by focusing on access control, monitoring, and operational adjustments specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-27T20:09:52.669Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6cb7ef31ef0b5a0663

Added to database: 2/25/2026, 9:49:32 PM

Last enriched: 2/25/2026, 10:15:21 PM

Last updated: 2/25/2026, 10:53:35 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats