Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8860: CWE-862 Missing Authorization in themefic Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress Plugin | WooCommerce Booking

0
Medium
VulnerabilityCVE-2024-8860cvecve-2024-8860cwe-862
Published: Tue Aug 26 2025 (08/26/2025, 07:06:03 UTC)
Source: CVE Database V5
Vendor/Project: themefic
Product: Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress Plugin | WooCommerce Booking

Description

CVE-2024-8860 is a medium severity vulnerability in the Tourfic WordPress plugin, affecting all versions up to 2. 14. 5. It stems from missing authorization checks in multiple functions, allowing authenticated users with subscriber-level access or higher to modify order and visitor data without proper permissions. Exploitation enables unauthorized actions such as resending order status emails, editing visitor and order details, changing check-in/out information, performing bulk order status updates, removing room order IDs, and deleting old review fields. No user interaction is required beyond authentication, and the vulnerability does not impact confidentiality or availability but compromises data integrity. There are no known exploits in the wild currently, and no official patches have been published yet. Organizations using this plugin should prioritize access control reviews and implement compensating controls to mitigate risk until a patch is available.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:52:23 UTC

Technical Analysis

The Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress plugin (including WooCommerce Booking integration) suffers from a missing authorization vulnerability identified as CVE-2024-8860 (CWE-862). This vulnerability affects all versions up to and including 2.14.5. The root cause is the absence of capability checks in several key plugin functions: tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields. These functions handle critical operations such as resending order status emails, editing visitor and order details, modifying check-in/out data, bulk updating order statuses, removing room order identifiers, and deleting review fields. Because the plugin fails to verify that the authenticated user has the appropriate permissions before executing these functions, any user with subscriber-level access or higher can perform unauthorized modifications. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and no impact on confidentiality or availability, but a clear impact on data integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was assigned by Wordfence and publicly disclosed on August 26, 2025.

Potential Impact

This vulnerability primarily impacts the integrity of data managed by the Tourfic plugin on WordPress sites. Attackers with subscriber-level access can manipulate booking and order information, potentially leading to fraudulent order modifications, misinformation sent to customers via order status emails, and disruption of booking records. This can undermine customer trust, cause operational disruptions, and complicate financial reconciliation for travel, hotel, and car rental businesses using the plugin. Although confidentiality and availability are not directly affected, the unauthorized data changes could facilitate further attacks or fraud schemes. Organizations relying on Tourfic for booking management face risks of internal misuse or exploitation by compromised low-privilege accounts. The lack of patches and the plugin’s widespread use in the travel and hospitality sectors increase the urgency for mitigation. The absence of known exploits suggests limited active exploitation currently, but the ease of exploitation and the broad scope of affected functions raise concerns for future attacks.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls to limit subscriber-level accounts and regularly audit user roles and permissions within WordPress. Consider temporarily disabling or restricting the Tourfic plugin’s critical functions via custom code or security plugins that enforce capability checks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Monitor logs for unusual activity related to order modifications or email resends. Educate administrators and users about the risk of low-privilege account compromise and enforce strong authentication mechanisms, including multi-factor authentication (MFA). Keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases. If feasible, isolate the booking system from other critical infrastructure to limit lateral movement in case of exploitation. Finally, prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-13T20:35:09.835Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b38b7ef31ef0b54f681

Added to database: 2/25/2026, 9:35:52 PM

Last enriched: 2/25/2026, 10:52:23 PM

Last updated: 2/26/2026, 7:12:53 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats