Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12685: CWE-352 Cross-Site Request Forgery (CSRF) in WPBookit

0
Medium
VulnerabilityCVE-2025-12685cvecve-2025-12685cwe-352
Published: Fri Jan 02 2026 (01/02/2026, 06:00:10 UTC)
Source: CVE Database V5
Product: WPBookit

Description

The WPBookit WordPress plugin through 1.0.7 lacks a CSRF check when deleting customers. This could allow an unauthenticated attacker to delete any customer through a CSRF attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:29:56 UTC

Technical Analysis

CVE-2025-12685 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WPBookit WordPress plugin, specifically affecting versions through 1.0.7. The vulnerability arises because the plugin fails to implement CSRF tokens or other anti-CSRF mechanisms when processing requests to delete customer records. This security oversight allows an attacker to craft malicious web requests that, when executed by an authenticated administrator’s browser, can delete customer data without their consent or knowledge. The vulnerability is exploitable remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects the confidentiality and integrity of customer data, as unauthorized deletion can lead to data loss and potential disruption of business operations. Although no public exploits have been reported, the vulnerability’s presence in a widely used WordPress plugin for booking management systems poses a tangible risk. The plugin’s role in managing customer information makes the vulnerability particularly sensitive, as attackers could disrupt service continuity or cause reputational damage. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by affected users.

Potential Impact

The vulnerability allows attackers to delete customer records without authorization, impacting data confidentiality and integrity. This can lead to loss of critical customer information, disruption of booking and customer management workflows, and potential reputational damage for organizations relying on WPBookit. Since the attack requires no authentication or user interaction, it can be executed remotely and silently, increasing the risk of widespread exploitation. Organizations may face operational downtime while restoring lost data, and customers could lose trust due to data mishandling. Although availability is not directly affected, the indirect impact on business continuity can be significant. The vulnerability is particularly concerning for businesses that rely heavily on WPBookit for customer management, including small to medium enterprises in service industries such as hospitality, healthcare, and education.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict access to the WordPress admin interface to trusted IP addresses or VPNs to reduce exposure. 2) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious CSRF attack patterns targeting customer deletion endpoints. 3) Educate administrators to avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress. 4) Regularly back up customer data and test restoration procedures to minimize impact from potential data loss. 5) Monitor logs for unusual deletion activities or unexpected HTTP requests to the plugin’s endpoints. 6) Consider temporarily disabling the customer deletion feature if feasible until a patch is available. 7) Stay updated with WPBookit plugin releases and apply security updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-04T05:28:26.059Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6957621bdb813ff03ed0f77b

Added to database: 1/2/2026, 6:13:47 AM

Last enriched: 4/3/2026, 3:29:56 AM

Last updated: 5/6/2026, 2:16:44 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses