Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10124: CWE-863 Incorrect Authorization in Booking Manager

0
Medium
VulnerabilityCVE-2025-10124cvecve-2025-10124cwe-863
Published: Fri Oct 10 2025 (10/10/2025, 06:00:06 UTC)
Source: CVE Database V5
Product: Booking Manager

Description

The Booking Manager WordPress plugin before 2.1.15 registers a shortcode that deletes bookings and makes that shortcode available to anyone with contributor and above privileges. When a page containing the shortcode is visited, the bookings are deleted.

AI-Powered Analysis

AILast updated: 11/13/2025, 21:32:16 UTC

Technical Analysis

CVE-2025-10124 is an authorization vulnerability classified under CWE-863 found in the Booking Manager WordPress plugin versions prior to 2.1.15. The plugin registers a shortcode that, when embedded in a page, deletes bookings. This shortcode is improperly exposed to users with contributor or higher privileges, allowing them to trigger booking deletions by simply visiting the page containing the shortcode. The vulnerability arises from insufficient authorization checks on the shortcode execution, enabling privilege escalation within the bounds of authenticated contributor-level users. The CVSS 3.1 base score is 4.5 (medium), reflecting that the attack vector is network-based (via web access), requires low attack complexity, but demands privileges (PR:H) and user interaction (UI:R). The impact is high on integrity as bookings can be deleted without proper authorization, but confidentiality and availability remain unaffected. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on Booking Manager for managing reservations. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, especially in sectors like hospitality, tourism, and services. The vulnerability can be exploited by authenticated users with contributor roles, which are often granted to content creators or editors, thus increasing the risk if role assignments are not tightly controlled. The lack of a patch link suggests that users should upgrade to version 2.1.15 or later where the issue is fixed. Organizations should audit user roles and shortcode usage to mitigate risk.

Potential Impact

The primary impact of CVE-2025-10124 is on the integrity of booking data within affected WordPress sites using the Booking Manager plugin. Unauthorized deletion of bookings can disrupt business operations, cause loss of revenue, and damage customer trust. For European organizations in the hospitality, tourism, and service industries, this could lead to operational downtime and reputational harm. Since contributor-level users can exploit this vulnerability, insider threats or compromised contributor accounts pose a significant risk. The vulnerability does not affect confidentiality or availability directly but undermines data reliability and operational continuity. The medium CVSS score reflects moderate risk; however, the impact could be amplified in organizations with lax user privilege management or heavy reliance on the plugin for critical booking functions. No known exploits in the wild reduce immediate risk but do not eliminate the threat. European entities with high WordPress usage and extensive booking operations are particularly vulnerable to this integrity compromise.

Mitigation Recommendations

1. Immediately update the Booking Manager plugin to version 2.1.15 or later where the vulnerability is patched. 2. Review and restrict user roles, especially contributor privileges, to only trusted personnel. 3. Audit WordPress pages and posts for the presence of the vulnerable shortcode and remove or restrict access to pages containing it. 4. Implement strict access controls and monitoring on WordPress admin accounts to detect unauthorized shortcode usage. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious shortcode execution patterns. 6. Educate content creators and contributors about the risks of shortcode misuse and enforce least privilege principles. 7. Regularly back up booking data to enable recovery in case of unauthorized deletions. 8. Monitor logs for unusual booking deletions or page visits by contributor-level users. 9. Consider disabling shortcode execution for contributors if not necessary for their role. 10. Engage in vulnerability scanning and penetration testing focused on WordPress plugins to proactively identify similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-09-08T17:28:36.714Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e8ab7b7817465f6ff24971

Added to database: 10/10/2025, 6:45:15 AM

Last enriched: 11/13/2025, 9:32:16 PM

Last updated: 11/23/2025, 1:25:24 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats