Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13385: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in bylancer Bookme – Free Online Appointment Booking and Scheduling Plugin

0
Medium
VulnerabilityCVE-2025-13385cvecve-2025-13385cwe-89
Published: Tue Nov 25 2025 (11/25/2025, 07:28:27 UTC)
Source: CVE Database V5
Vendor/Project: bylancer
Product: Bookme – Free Online Appointment Booking and Scheduling Plugin

Description

CVE-2025-13385 is a medium-severity SQL Injection vulnerability affecting all versions up to 4. 2 of the Bookme WordPress plugin by bylancer. The flaw exists in the `filter[status]` parameter, which is insufficiently sanitized, allowing authenticated users with admin privileges to perform time-based SQL injection attacks. Exploitation requires admin-level access and no user interaction, enabling attackers to extract sensitive database information. Although no known exploits are currently in the wild, the vulnerability poses a confidentiality risk. European organizations using this plugin for appointment scheduling could face data breaches if exploited. Mitigation involves updating the plugin once a patch is available or applying strict input validation and query parameterization. Countries with high WordPress usage and significant SME sectors, such as Germany, France, and the UK, are most likely affected. Due to the requirement for admin privileges and the medium CVSS score, the overall severity is medium. Defenders should prioritize access control reviews and monitor for suspicious admin activity related to this plugin.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:52:33 UTC

Technical Analysis

CVE-2025-13385 is a time-based SQL Injection vulnerability identified in the Bookme – Free Online Appointment Booking and Scheduling Plugin for WordPress, developed by bylancer. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) specifically via the `filter[status]` parameter. This parameter is used in SQL queries without adequate escaping or parameterization, allowing an authenticated attacker with admin-level privileges to inject malicious SQL code. The injection is time-based, meaning attackers can infer data by measuring response delays, enabling extraction of sensitive database information such as user credentials, appointment details, or other confidential data stored in the backend. The vulnerability affects all versions up to and including 4.2 of the plugin. Exploitation requires no user interaction but does require high privileges (admin or above), limiting the attack surface to compromised or malicious insiders or attackers who have already gained elevated access. The CVSS v3.1 score is 4.9 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used by small to medium businesses for appointment scheduling, making the vulnerability relevant to organizations relying on WordPress-based booking systems.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive customer and business data stored within the Bookme plugin's database. Given the plugin’s role in managing appointments, attackers could extract personally identifiable information (PII), appointment schedules, and potentially other confidential business data. This could result in privacy violations under GDPR, reputational damage, and potential regulatory fines. The requirement for admin-level access reduces the risk of external exploitation but increases the threat from insider attacks or attackers who have compromised admin credentials. The lack of impact on integrity and availability means the primary concern is confidentiality breach. Organizations using this plugin in sectors such as healthcare, legal services, or consulting—where appointment data is sensitive—face higher risks. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within the network if attackers gain admin access.

Mitigation Recommendations

1. Immediately audit and restrict admin-level access to the WordPress environment and the Bookme plugin to trusted personnel only. 2. Monitor admin account activities for unusual behavior or unauthorized access attempts. 3. Apply principle of least privilege to WordPress users to minimize the number of accounts with admin rights. 4. Until an official patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the `filter[status]` parameter. 5. Employ input validation and sanitization at the application level if possible, ensuring that parameters passed to SQL queries are properly escaped or parameterized. 6. Regularly back up the WordPress site and database to enable recovery in case of compromise. 7. Once available, promptly update the Bookme plugin to a patched version that addresses this vulnerability. 8. Conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T21:01:51.304Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e28292ce6fc00be0616

Added to database: 11/25/2025, 7:43:36 AM

Last enriched: 12/2/2025, 2:52:33 PM

Last updated: 12/4/2025, 9:33:23 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats