CVE-2024-8860: CWE-862 Missing Authorization in themefic Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress Plugin | WooCommerce Booking
CVE-2024-8860 is a medium severity vulnerability in the Tourfic WordPress plugin, affecting all versions up to 2. 14. 5. It stems from missing authorization checks in multiple functions, allowing authenticated users with subscriber-level access or higher to modify order and visitor data without proper permissions. Exploitation enables unauthorized actions such as resending order status emails, editing visitor and order details, changing check-in/out information, performing bulk order status updates, removing room order IDs, and deleting old review fields. No user interaction is required beyond authentication, and the vulnerability does not impact confidentiality or availability but compromises data integrity. There are no known exploits in the wild currently, and no official patches have been published yet. Organizations using this plugin should prioritize access control reviews and implement compensating controls to mitigate risk until a patch is available.
AI Analysis
Technical Summary
The Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress plugin (including WooCommerce Booking integration) suffers from a missing authorization vulnerability identified as CVE-2024-8860 (CWE-862). This vulnerability affects all versions up to and including 2.14.5. The root cause is the absence of capability checks in several key plugin functions: tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields. These functions handle critical operations such as resending order status emails, editing visitor and order details, modifying check-in/out data, bulk updating order statuses, removing room order identifiers, and deleting review fields. Because the plugin fails to verify that the authenticated user has the appropriate permissions before executing these functions, any user with subscriber-level access or higher can perform unauthorized modifications. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and no impact on confidentiality or availability, but a clear impact on data integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was assigned by Wordfence and publicly disclosed on August 26, 2025.
Potential Impact
This vulnerability primarily impacts the integrity of data managed by the Tourfic plugin on WordPress sites. Attackers with subscriber-level access can manipulate booking and order information, potentially leading to fraudulent order modifications, misinformation sent to customers via order status emails, and disruption of booking records. This can undermine customer trust, cause operational disruptions, and complicate financial reconciliation for travel, hotel, and car rental businesses using the plugin. Although confidentiality and availability are not directly affected, the unauthorized data changes could facilitate further attacks or fraud schemes. Organizations relying on Tourfic for booking management face risks of internal misuse or exploitation by compromised low-privilege accounts. The lack of patches and the plugin’s widespread use in the travel and hospitality sectors increase the urgency for mitigation. The absence of known exploits suggests limited active exploitation currently, but the ease of exploitation and the broad scope of affected functions raise concerns for future attacks.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit subscriber-level accounts and regularly audit user roles and permissions within WordPress. Consider temporarily disabling or restricting the Tourfic plugin’s critical functions via custom code or security plugins that enforce capability checks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Monitor logs for unusual activity related to order modifications or email resends. Educate administrators and users about the risk of low-privilege account compromise and enforce strong authentication mechanisms, including multi-factor authentication (MFA). Keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases. If feasible, isolate the booking system from other critical infrastructure to limit lateral movement in case of exploitation. Finally, prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
United States, India, United Kingdom, Germany, Australia, Canada, France, Brazil, Japan, Netherlands
CVE-2024-8860: CWE-862 Missing Authorization in themefic Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress Plugin | WooCommerce Booking
Description
CVE-2024-8860 is a medium severity vulnerability in the Tourfic WordPress plugin, affecting all versions up to 2. 14. 5. It stems from missing authorization checks in multiple functions, allowing authenticated users with subscriber-level access or higher to modify order and visitor data without proper permissions. Exploitation enables unauthorized actions such as resending order status emails, editing visitor and order details, changing check-in/out information, performing bulk order status updates, removing room order IDs, and deleting old review fields. No user interaction is required beyond authentication, and the vulnerability does not impact confidentiality or availability but compromises data integrity. There are no known exploits in the wild currently, and no official patches have been published yet. Organizations using this plugin should prioritize access control reviews and implement compensating controls to mitigate risk until a patch is available.
AI-Powered Analysis
Technical Analysis
The Tourfic – Ultimate Travel Booking, Hotel Booking & Car Rental WordPress plugin (including WooCommerce Booking integration) suffers from a missing authorization vulnerability identified as CVE-2024-8860 (CWE-862). This vulnerability affects all versions up to and including 2.14.5. The root cause is the absence of capability checks in several key plugin functions: tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields. These functions handle critical operations such as resending order status emails, editing visitor and order details, modifying check-in/out data, bulk updating order statuses, removing room order identifiers, and deleting review fields. Because the plugin fails to verify that the authenticated user has the appropriate permissions before executing these functions, any user with subscriber-level access or higher can perform unauthorized modifications. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and no impact on confidentiality or availability, but a clear impact on data integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was assigned by Wordfence and publicly disclosed on August 26, 2025.
Potential Impact
This vulnerability primarily impacts the integrity of data managed by the Tourfic plugin on WordPress sites. Attackers with subscriber-level access can manipulate booking and order information, potentially leading to fraudulent order modifications, misinformation sent to customers via order status emails, and disruption of booking records. This can undermine customer trust, cause operational disruptions, and complicate financial reconciliation for travel, hotel, and car rental businesses using the plugin. Although confidentiality and availability are not directly affected, the unauthorized data changes could facilitate further attacks or fraud schemes. Organizations relying on Tourfic for booking management face risks of internal misuse or exploitation by compromised low-privilege accounts. The lack of patches and the plugin’s widespread use in the travel and hospitality sectors increase the urgency for mitigation. The absence of known exploits suggests limited active exploitation currently, but the ease of exploitation and the broad scope of affected functions raise concerns for future attacks.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit subscriber-level accounts and regularly audit user roles and permissions within WordPress. Consider temporarily disabling or restricting the Tourfic plugin’s critical functions via custom code or security plugins that enforce capability checks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Monitor logs for unusual activity related to order modifications or email resends. Educate administrators and users about the risk of low-privilege account compromise and enforce strong authentication mechanisms, including multi-factor authentication (MFA). Keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases. If feasible, isolate the booking system from other critical infrastructure to limit lateral movement in case of exploitation. Finally, prepare incident response plans to quickly address any detected exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-13T20:35:09.835Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b38b7ef31ef0b54f681
Added to database: 2/25/2026, 9:35:52 PM
Last enriched: 2/25/2026, 10:52:23 PM
Last updated: 2/26/2026, 7:12:53 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.