Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12842: CWE-20 Improper Input Validation in timeslotplugins Booking Plugin for WordPress Appointments – Time Slot

0
Medium
VulnerabilityCVE-2025-12842cvecve-2025-12842cwe-20
Published: Wed Nov 19 2025 (11/19/2025, 05:45:10 UTC)
Source: CVE Database V5
Vendor/Project: timeslotplugins
Product: Booking Plugin for WordPress Appointments – Time Slot

Description

The Booking Plugin for WordPress Appointments – Time Slot plugin for WordPress is vulnerable to unauthorized email sending in versions up to, and including, 1.4.7 due to missing validation on the tslot_appt_email AJAX action. This makes it possible for unauthenticated attackers to send appointment notification emails to arbitrary recipients with attacker-controlled text content in certain email fields, potentially enabling the site to be abused for phishing campaigns or spam distribution.

AI-Powered Analysis

AILast updated: 11/19/2025, 06:52:31 UTC

Technical Analysis

CVE-2025-12842 identifies an improper input validation vulnerability (CWE-20) in the Booking Plugin for WordPress Appointments – Time Slot plugin, versions up to and including 1.4.7. The vulnerability arises from the lack of validation on the 'tslot_appt_email' AJAX action, which handles sending appointment notification emails. Because this action is accessible without authentication, an attacker can craft requests that cause the plugin to send emails to arbitrary recipients with attacker-controlled text in certain email fields. This flaw enables the affected WordPress site to be leveraged as a vector for phishing or spam distribution campaigns, potentially damaging the site's reputation and facilitating further attacks on recipients. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and impact limited to integrity (manipulated email content) without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is significant because WordPress is widely used, and appointment booking plugins are common in service-oriented businesses, increasing the potential attack surface. The lack of authentication and input validation makes exploitation straightforward for remote attackers.

Potential Impact

For European organizations, this vulnerability can lead to their WordPress sites being abused to send phishing or spam emails, which can damage brand reputation and erode customer trust. Organizations in sectors relying heavily on appointment scheduling—such as healthcare, legal services, education, and small retail—are particularly vulnerable. Abuse of the plugin could facilitate targeted phishing campaigns against clients or partners, potentially leading to credential theft or malware infections. Additionally, spam originating from legitimate domains can result in blacklisting of organizational email servers, disrupting legitimate communications. While the vulnerability does not directly compromise data confidentiality or system availability, the indirect consequences of phishing and reputational damage can be severe. Given the widespread use of WordPress in Europe, especially among SMEs, the scope of impact is considerable.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting access to the 'tslot_appt_email' AJAX action to authenticated users only, if possible. Organizations should implement strict server-side input validation and sanitization on all email-related fields to prevent injection of arbitrary content. Monitoring outgoing emails for unusual patterns or unexpected recipients can help detect exploitation attempts early. Applying any available updates or patches from the plugin vendor as soon as they are released is critical. If patching is delayed, consider temporarily replacing the plugin with alternative booking solutions that do not exhibit this vulnerability. Web application firewalls (WAFs) can be configured to block suspicious AJAX requests targeting the vulnerable endpoint. Additionally, educating staff about phishing risks and encouraging verification of unexpected appointment emails can reduce the impact of potential phishing campaigns leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-06T20:19:03.726Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d6897a27e6d5e91bc16e1

Added to database: 11/19/2025, 6:49:59 AM

Last enriched: 11/19/2025, 6:52:31 AM

Last updated: 11/21/2025, 8:27:50 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats