CVE-2025-13385: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in bylancer Bookme – Free Online Appointment Booking and Scheduling Plugin
CVE-2025-13385 is a medium-severity SQL Injection vulnerability affecting all versions up to 4. 2 of the Bookme WordPress plugin by bylancer. The flaw exists in the `filter[status]` parameter, which is insufficiently sanitized, allowing authenticated users with admin privileges to perform time-based SQL injection attacks. Exploitation requires admin-level access and no user interaction, enabling attackers to extract sensitive database information. Although no known exploits are currently in the wild, the vulnerability poses a confidentiality risk. European organizations using this plugin for appointment scheduling could face data breaches if exploited. Mitigation involves updating the plugin once a patch is available or applying strict input validation and query parameterization. Countries with high WordPress usage and significant SME sectors, such as Germany, France, and the UK, are most likely affected. Due to the requirement for admin privileges and the medium CVSS score, the overall severity is medium. Defenders should prioritize access control reviews and monitor for suspicious admin activity related to this plugin.
AI Analysis
Technical Summary
CVE-2025-13385 is a time-based SQL Injection vulnerability identified in the Bookme – Free Online Appointment Booking and Scheduling Plugin for WordPress, developed by bylancer. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) specifically via the `filter[status]` parameter. This parameter is used in SQL queries without adequate escaping or parameterization, allowing an authenticated attacker with admin-level privileges to inject malicious SQL code. The injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive database information such as user credentials, appointment details, or other confidential data stored in the backend. The vulnerability affects all versions up to and including 4.2 of the plugin. Exploitation requires no user interaction but does require high privileges (admin or above), limiting the attack surface to compromised or malicious insiders or attackers who have already gained elevated access. The CVSS v3.1 score is 4.9 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used by small to medium businesses for appointment scheduling, making the vulnerability relevant to organizations relying on WordPress-based booking systems.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive customer and business data stored within the Bookme plugin's database. Given the plugin’s role in managing appointments, attackers could extract personally identifiable information (PII), appointment schedules, and potentially other confidential business data. This could result in privacy violations under GDPR, reputational damage, and potential regulatory fines. The requirement for admin-level access reduces the risk of external exploitation but increases the threat from insider attacks or attackers who have compromised admin credentials. The lack of impact on integrity and availability means the primary concern is confidentiality breach. Organizations using this plugin in sectors such as healthcare, legal services, or consulting—where appointment data is sensitive—face higher risks. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within the network if attackers gain admin access.
Mitigation Recommendations
1. Immediately audit and restrict admin-level access to the WordPress environment and the Bookme plugin to trusted personnel only. 2. Monitor admin account activities for unusual behavior or unauthorized access attempts. 3. Apply principle of least privilege to WordPress users to minimize the number of accounts with admin rights. 4. Until an official patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the `filter[status]` parameter. 5. Employ input validation and sanitization at the application level if possible, ensuring that parameters passed to SQL queries are properly escaped or parameterized. 6. Regularly back up the WordPress site and database to enable recovery in case of compromise. 7. Once available, promptly update the Bookme plugin to a patched version that addresses this vulnerability. 8. Conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13385: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in bylancer Bookme – Free Online Appointment Booking and Scheduling Plugin
Description
CVE-2025-13385 is a medium-severity SQL Injection vulnerability affecting all versions up to 4. 2 of the Bookme WordPress plugin by bylancer. The flaw exists in the `filter[status]` parameter, which is insufficiently sanitized, allowing authenticated users with admin privileges to perform time-based SQL injection attacks. Exploitation requires admin-level access and no user interaction, enabling attackers to extract sensitive database information. Although no known exploits are currently in the wild, the vulnerability poses a confidentiality risk. European organizations using this plugin for appointment scheduling could face data breaches if exploited. Mitigation involves updating the plugin once a patch is available or applying strict input validation and query parameterization. Countries with high WordPress usage and significant SME sectors, such as Germany, France, and the UK, are most likely affected. Due to the requirement for admin privileges and the medium CVSS score, the overall severity is medium. Defenders should prioritize access control reviews and monitor for suspicious admin activity related to this plugin.
AI-Powered Analysis
Technical Analysis
CVE-2025-13385 is a time-based SQL Injection vulnerability identified in the Bookme – Free Online Appointment Booking and Scheduling Plugin for WordPress, developed by bylancer. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) specifically via the `filter[status]` parameter. This parameter is used in SQL queries without adequate escaping or parameterization, allowing an authenticated attacker with admin-level privileges to inject malicious SQL code. The injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive database information such as user credentials, appointment details, or other confidential data stored in the backend. The vulnerability affects all versions up to and including 4.2 of the plugin. Exploitation requires no user interaction but does require high privileges (admin or above), limiting the attack surface to compromised or malicious insiders or attackers who have already gained elevated access. The CVSS v3.1 score is 4.9 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used by small to medium businesses for appointment scheduling, making the vulnerability relevant to organizations relying on WordPress-based booking systems.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive customer and business data stored within the Bookme plugin's database. Given the plugin’s role in managing appointments, attackers could extract personally identifiable information (PII), appointment schedules, and potentially other confidential business data. This could result in privacy violations under GDPR, reputational damage, and potential regulatory fines. The requirement for admin-level access reduces the risk of external exploitation but increases the threat from insider attacks or attackers who have compromised admin credentials. The lack of impact on integrity and availability means the primary concern is confidentiality breach. Organizations using this plugin in sectors such as healthcare, legal services, or consulting—where appointment data is sensitive—face higher risks. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within the network if attackers gain admin access.
Mitigation Recommendations
1. Immediately audit and restrict admin-level access to the WordPress environment and the Bookme plugin to trusted personnel only. 2. Monitor admin account activities for unusual behavior or unauthorized access attempts. 3. Apply principle of least privilege to WordPress users to minimize the number of accounts with admin rights. 4. Until an official patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the `filter[status]` parameter. 5. Employ input validation and sanitization at the application level if possible, ensuring that parameters passed to SQL queries are properly escaped or parameterized. 6. Regularly back up the WordPress site and database to enable recovery in case of compromise. 7. Once available, promptly update the Bookme plugin to a patched version that addresses this vulnerability. 8. Conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T21:01:51.304Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69255e28292ce6fc00be0616
Added to database: 11/25/2025, 7:43:36 AM
Last enriched: 12/2/2025, 2:52:33 PM
Last updated: 12/4/2025, 9:33:23 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66238: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Sunbird DCIM dcTrack
HighCVE-2025-65900: n/a
UnknownCVE-2025-65899: n/a
UnknownCVE-2025-13932: CWE-639 Authorization Bypass Through User-Controlled Key in SolisCloud Monitoring Platform (Cloud API & Device Control API)
UnknownCVE-2025-66479: CWE-693: Protection Mechanism Failure in anthropic-experimental sandbox-runtime
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.