Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12573: CWE-862 Missing Authorization in Bookingor

0
Medium
VulnerabilityCVE-2025-12573cvecve-2025-12573cwe-862
Published: Tue Jan 20 2026 (01/20/2026, 06:00:06 UTC)
Source: CVE Database V5
Product: Bookingor

Description

The Bookingor WordPress plugin through 1.0.12 exposes authenticated AJAX actions without capability or nonce checks, allowing low-privileged users to delete Bookingor WordPress plugin through 1.0.12 data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:29:35 UTC

Technical Analysis

CVE-2025-12573 is a vulnerability identified in the Bookingor WordPress plugin versions up to 1.0.12. The core issue is a missing authorization check (CWE-862) in the plugin's AJAX actions, which are exposed to authenticated users without verifying their capabilities or validating nonces. This security lapse allows low-privileged users—such as subscribers or contributors—to perform unauthorized deletion of Bookingor plugin data. The vulnerability arises because the plugin's AJAX endpoints do not enforce proper permission checks, enabling privilege escalation within the plugin's operational scope. The attack vector is network-based (AV:N), requiring low privileges (PR:L) but no user interaction (UI:N), and the scope remains unchanged (S:U). The impact affects data integrity (I:H) but not confidentiality or availability. Although no public exploits have been reported, the vulnerability poses a risk to any WordPress site using the Bookingor plugin for managing bookings or reservations. The absence of nonce and capability checks means that an attacker with minimal authenticated access can manipulate or delete critical booking data, potentially disrupting business operations or causing data loss. The vulnerability was reserved in late 2025 and published in early 2026, with no patches currently available, highlighting the need for immediate attention from site administrators.

Potential Impact

The primary impact of CVE-2025-12573 is on the integrity of booking data managed by the Bookingor plugin. Unauthorized deletion of booking information can lead to operational disruptions, loss of customer trust, and potential financial losses for businesses relying on accurate reservation data. Since the vulnerability requires authenticated access, attackers must first compromise or gain low-level access to a WordPress user account, which is a common scenario in many environments due to weak passwords or phishing. The lack of confidentiality and availability impact means sensitive data leakage or denial of service are not direct concerns; however, the ability to delete data without proper authorization can undermine business continuity and data reliability. Organizations with high transaction volumes or critical booking systems may experience significant operational impact. Additionally, the absence of nonce checks increases the risk of Cross-Site Request Forgery (CSRF) attacks, potentially allowing attackers to exploit authenticated sessions to trigger unauthorized deletions. The medium CVSS score reflects these factors, emphasizing the need for timely mitigation to prevent exploitation.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the Bookingor plugin's AJAX endpoints by limiting user roles that can authenticate and interact with these endpoints, ideally to trusted administrators only. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests targeting Bookingor endpoints, especially those attempting deletion actions. 3. Monitor user activity logs for unusual deletion requests or access patterns related to Bookingor data. 4. Enforce strong authentication policies for WordPress users, including multi-factor authentication (MFA) and strong password requirements, to reduce the risk of low-privileged account compromise. 5. Until an official patch is released, consider temporarily disabling or removing the Bookingor plugin if it is not critical to operations. 6. Once available, promptly apply official patches or updates from the plugin developer that address the missing authorization checks. 7. For developers or site administrators with technical expertise, consider implementing custom code to add nonce verification and capability checks on the plugin's AJAX handlers as an interim fix. 8. Educate users about phishing and credential security to prevent unauthorized access to low-privileged accounts. These steps collectively reduce the attack surface and limit the potential for exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-10-31T20:55:18.575Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f1ec84623b1157c1b768d

Added to database: 1/20/2026, 6:20:56 AM

Last enriched: 4/3/2026, 3:29:35 AM

Last updated: 5/10/2026, 6:52:08 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses