CVE-2025-12841: CWE-862 Missing Authorization in Bookit
The Bookit WordPress plugin before 2.5.1 has a publicly accessible REST endpoint that allows unauthenticated update of the plugins Stripe payment options.
AI Analysis
Technical Summary
CVE-2025-12841 is a security vulnerability classified under CWE-862 (Missing Authorization) found in the Bookit WordPress plugin prior to version 2.5.1. The flaw resides in a REST API endpoint that is publicly accessible and does not require authentication, allowing any unauthenticated user to update the plugin's Stripe payment options. Stripe payment options typically include critical configuration details such as API keys, webhook URLs, and payment processing parameters. Unauthorized modification of these settings could enable attackers to redirect payments to attacker-controlled accounts, disrupt payment processing, or cause denial of service to legitimate transactions. The vulnerability arises due to the absence of proper authorization checks on the REST endpoint, violating the principle of least privilege. Although no public exploits are currently known, the simplicity of exploiting an unauthenticated endpoint makes this vulnerability a significant risk. The affected versions are all versions before 2.5.1, and no patch links are currently provided, indicating that users must monitor for updates or implement temporary mitigations. The vulnerability was reserved in early November 2025 and published in December 2025. The plugin is used primarily by WordPress sites that handle booking and payment functionalities, making it a target for financially motivated attackers. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for businesses relying on the Bookit plugin for e-commerce, booking, or subscription services. Unauthorized modification of Stripe payment options can lead to financial fraud, including diversion of payments to attacker-controlled accounts, resulting in direct monetary loss. Additionally, disruption of payment processing can damage customer trust and cause operational downtime. The integrity of financial transactions is compromised, and confidentiality of payment configuration data is at risk. Organizations in sectors such as hospitality, event management, and online services that use Bookit are particularly vulnerable. The public accessibility of the vulnerable endpoint means attackers can exploit this remotely without any authentication or user interaction, increasing the likelihood of exploitation. The absence of known exploits currently provides a window for mitigation, but the risk remains high due to the ease of exploitation and potential financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should prioritize updating the Bookit plugin to version 2.5.1 or later as soon as it becomes available, as this will likely include the necessary authorization checks. Until an official patch is released, organizations can implement temporary mitigations such as restricting access to the vulnerable REST endpoint via web application firewalls (WAFs) or server-level access controls, limiting access to trusted IP addresses only. Additionally, monitoring and auditing changes to Stripe payment configurations can help detect unauthorized modifications early. Organizations should also review and rotate Stripe API keys and credentials if compromise is suspected. Employing strict role-based access controls within WordPress and disabling unnecessary REST API endpoints can reduce the attack surface. Regular backups of plugin configurations and payment settings will aid in recovery if unauthorized changes occur. Finally, raising awareness among IT and security teams about this vulnerability will ensure timely response and remediation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12841: CWE-862 Missing Authorization in Bookit
Description
The Bookit WordPress plugin before 2.5.1 has a publicly accessible REST endpoint that allows unauthenticated update of the plugins Stripe payment options.
AI-Powered Analysis
Technical Analysis
CVE-2025-12841 is a security vulnerability classified under CWE-862 (Missing Authorization) found in the Bookit WordPress plugin prior to version 2.5.1. The flaw resides in a REST API endpoint that is publicly accessible and does not require authentication, allowing any unauthenticated user to update the plugin's Stripe payment options. Stripe payment options typically include critical configuration details such as API keys, webhook URLs, and payment processing parameters. Unauthorized modification of these settings could enable attackers to redirect payments to attacker-controlled accounts, disrupt payment processing, or cause denial of service to legitimate transactions. The vulnerability arises due to the absence of proper authorization checks on the REST endpoint, violating the principle of least privilege. Although no public exploits are currently known, the simplicity of exploiting an unauthenticated endpoint makes this vulnerability a significant risk. The affected versions are all versions before 2.5.1, and no patch links are currently provided, indicating that users must monitor for updates or implement temporary mitigations. The vulnerability was reserved in early November 2025 and published in December 2025. The plugin is used primarily by WordPress sites that handle booking and payment functionalities, making it a target for financially motivated attackers. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for businesses relying on the Bookit plugin for e-commerce, booking, or subscription services. Unauthorized modification of Stripe payment options can lead to financial fraud, including diversion of payments to attacker-controlled accounts, resulting in direct monetary loss. Additionally, disruption of payment processing can damage customer trust and cause operational downtime. The integrity of financial transactions is compromised, and confidentiality of payment configuration data is at risk. Organizations in sectors such as hospitality, event management, and online services that use Bookit are particularly vulnerable. The public accessibility of the vulnerable endpoint means attackers can exploit this remotely without any authentication or user interaction, increasing the likelihood of exploitation. The absence of known exploits currently provides a window for mitigation, but the risk remains high due to the ease of exploitation and potential financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, affected organizations should prioritize updating the Bookit plugin to version 2.5.1 or later as soon as it becomes available, as this will likely include the necessary authorization checks. Until an official patch is released, organizations can implement temporary mitigations such as restricting access to the vulnerable REST endpoint via web application firewalls (WAFs) or server-level access controls, limiting access to trusted IP addresses only. Additionally, monitoring and auditing changes to Stripe payment configurations can help detect unauthorized modifications early. Organizations should also review and rotate Stripe API keys and credentials if compromise is suspected. Employing strict role-based access controls within WordPress and disabling unnecessary REST API endpoints can reduce the attack surface. Regular backups of plugin configurations and payment settings will aid in recovery if unauthorized changes occur. Finally, raising awareness among IT and security teams about this vulnerability will ensure timely response and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-11-06T20:18:19.213Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693beffae96055a68b9f7a24
Added to database: 12/12/2025, 10:35:38 AM
Last enriched: 12/12/2025, 10:50:39 AM
Last updated: 12/15/2025, 4:04:25 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67907
LowCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumCVE-2025-13740: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in someguy9 Lightweight Accordion
MediumCVE-2025-14699: Path Traversal in Municorn FAX App
MediumCVE-2025-14696: Weak Password Recovery in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.