CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
The Booking Calendar Contact Form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.60. This is due to missing authorization checks and payment verification in the `dex_bccf_check_IPN_verification` function. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and bypass payment requirements via the 'dex_bccf_ipn' parameter.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13318 affects the Booking Calendar Contact Form plugin for WordPress, developed by codepeople. It is classified under CWE-862 (Missing Authorization) and impacts all versions up to and including 1.2.60. The root cause is the absence of proper authorization checks and payment verification within the function dex_bccf_check_IPN_verification. This function is responsible for processing Instant Payment Notification (IPN) callbacks, which confirm bookings after payment. Due to missing validation, an unauthenticated attacker can craft requests with the 'dex_bccf_ipn' parameter to arbitrarily confirm bookings without completing payment. This bypass undermines the integrity of the booking and payment process, potentially allowing attackers to fraudulently confirm bookings and cause financial loss or operational disruption. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. However, it does not expose sensitive data (confidentiality) nor does it cause denial of service (availability). No patches or fixes have been released at the time of disclosure, and no known exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N).
Potential Impact
For European organizations, especially those in the hospitality, tourism, and service sectors relying on WordPress-based booking systems, this vulnerability poses a risk of fraudulent booking confirmations without payment. This can lead to financial losses, revenue leakage, and potential reputational damage if customers or partners are affected by unauthorized bookings. The integrity of booking data is compromised, which may disrupt operational workflows and cause administrative overhead to identify and rectify fraudulent entries. While confidentiality and availability are not directly impacted, the trustworthiness of the booking system is undermined. Organizations with high volumes of online bookings are at greater risk of exploitation. Additionally, attackers could leverage this flaw to create false booking records, complicating capacity planning and resource allocation. The lack of authentication and user interaction requirements makes exploitation easier, increasing the likelihood of automated or large-scale abuse.
Mitigation Recommendations
European organizations should immediately audit their WordPress sites to identify installations of the Booking Calendar Contact Form plugin, particularly versions up to 1.2.60. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict access to the IPN verification endpoint (dex_bccf_ipn) via web application firewalls (WAFs) or IP whitelisting to trusted payment gateway IP addresses. 2) Implement additional server-side authorization checks to validate the authenticity of booking confirmations, such as verifying payment status directly with payment providers before confirming bookings. 3) Monitor booking logs for unusual patterns indicative of fraudulent confirmations. 4) Disable or remove the vulnerable plugin if it is not essential or replace it with alternative booking solutions with verified security. 5) Stay alert for updates from the vendor or WordPress plugin repository and apply patches promptly once available. 6) Educate administrative staff to recognize and respond to suspicious booking activity. These steps go beyond generic advice by focusing on access control, validation, and monitoring specific to the vulnerability's exploitation vector.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
Description
The Booking Calendar Contact Form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.60. This is due to missing authorization checks and payment verification in the `dex_bccf_check_IPN_verification` function. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and bypass payment requirements via the 'dex_bccf_ipn' parameter.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13318 affects the Booking Calendar Contact Form plugin for WordPress, developed by codepeople. It is classified under CWE-862 (Missing Authorization) and impacts all versions up to and including 1.2.60. The root cause is the absence of proper authorization checks and payment verification within the function dex_bccf_check_IPN_verification. This function is responsible for processing Instant Payment Notification (IPN) callbacks, which confirm bookings after payment. Due to missing validation, an unauthenticated attacker can craft requests with the 'dex_bccf_ipn' parameter to arbitrarily confirm bookings without completing payment. This bypass undermines the integrity of the booking and payment process, potentially allowing attackers to fraudulently confirm bookings and cause financial loss or operational disruption. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. However, it does not expose sensitive data (confidentiality) nor does it cause denial of service (availability). No patches or fixes have been released at the time of disclosure, and no known exploits have been observed in the wild. The CVSS v3.1 base score is 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N).
Potential Impact
For European organizations, especially those in the hospitality, tourism, and service sectors relying on WordPress-based booking systems, this vulnerability poses a risk of fraudulent booking confirmations without payment. This can lead to financial losses, revenue leakage, and potential reputational damage if customers or partners are affected by unauthorized bookings. The integrity of booking data is compromised, which may disrupt operational workflows and cause administrative overhead to identify and rectify fraudulent entries. While confidentiality and availability are not directly impacted, the trustworthiness of the booking system is undermined. Organizations with high volumes of online bookings are at greater risk of exploitation. Additionally, attackers could leverage this flaw to create false booking records, complicating capacity planning and resource allocation. The lack of authentication and user interaction requirements makes exploitation easier, increasing the likelihood of automated or large-scale abuse.
Mitigation Recommendations
European organizations should immediately audit their WordPress sites to identify installations of the Booking Calendar Contact Form plugin, particularly versions up to 1.2.60. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict access to the IPN verification endpoint (dex_bccf_ipn) via web application firewalls (WAFs) or IP whitelisting to trusted payment gateway IP addresses. 2) Implement additional server-side authorization checks to validate the authenticity of booking confirmations, such as verifying payment status directly with payment providers before confirming bookings. 3) Monitor booking logs for unusual patterns indicative of fraudulent confirmations. 4) Disable or remove the vulnerable plugin if it is not essential or replace it with alternative booking solutions with verified security. 5) Stay alert for updates from the vendor or WordPress plugin repository and apply patches promptly once available. 6) Educate administrative staff to recognize and respond to suspicious booking activity. These steps go beyond generic advice by focusing on access control, validation, and monitoring specific to the vulnerability's exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-17T15:18:42.968Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692176e04ffda11ec247b4ff
Added to database: 11/22/2025, 8:40:00 AM
Last enriched: 11/22/2025, 8:40:17 AM
Last updated: 11/22/2025, 12:15:17 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.