Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13754: CWE-862 Missing Authorization in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin

0
Medium
VulnerabilityCVE-2025-13754cvecve-2025-13754cwe-862
Published: Fri Dec 19 2025 (12/19/2025, 06:48:22 UTC)
Source: CVE Database V5
Vendor/Project: croixhaug
Product: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin

Description

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.9.16. This is due to the plugin exposing its admin embed endpoint at `/wp-json/ssa/v1/embed-inner-admin` without authentication, which leaks plugin settings including staff names, business names, and configuration data that are not publicly displayed on the booking form. This makes it possible for unauthenticated attackers to extract private business configuration. In premium versions with integrations configured, this might also expose other sensitive data including API keys for external services.

AI-Powered Analysis

AILast updated: 12/19/2025, 07:16:35 UTC

Technical Analysis

CVE-2025-13754 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Simply Schedule Appointments Booking Plugin for WordPress, developed by croixhaug. The issue arises because the plugin exposes an admin embed endpoint at /wp-json/ssa/v1/embed-inner-admin without any authentication or authorization checks. This endpoint leaks sensitive configuration data including staff names, business names, and other plugin settings that are not intended for public access. In premium versions where integrations with external services are configured, the vulnerability can also expose API keys, which could be leveraged to access or manipulate third-party services. The vulnerability affects all plugin versions up to and including 1.6.9.16. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the fact that the vulnerability can be exploited remotely without authentication or user interaction, but only results in confidentiality loss without impacting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability’s root cause is the lack of proper authorization checks on a sensitive REST API endpoint, allowing unauthenticated attackers to retrieve private business configuration data that could facilitate further attacks or information gathering.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) that commonly use WordPress and plugins like Simply Schedule Appointments, this vulnerability poses a risk of sensitive business information disclosure. Exposure of staff and business names can aid social engineering or spear-phishing attacks. More critically, in premium plugin versions, leaked API keys could allow attackers to access or manipulate integrated external services, potentially leading to data breaches or service disruptions. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust, violate data protection regulations such as GDPR, and result in reputational damage. Organizations relying on this plugin for customer appointment management may face operational risks if attackers leverage exposed API keys to disrupt services or exfiltrate data from connected platforms.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable REST API endpoint by implementing authentication and authorization controls at the web server or application level, such as IP whitelisting or requiring logged-in admin credentials. Organizations should audit their WordPress installations to identify usage of the Simply Schedule Appointments plugin and verify the plugin version. Until an official patch is released, disabling or removing the plugin can be considered if the risk is unacceptable. For premium users, it is critical to rotate any exposed API keys for external services to prevent unauthorized access. Monitoring web server logs for suspicious access to /wp-json/ssa/v1/embed-inner-admin can help detect exploitation attempts. Finally, organizations should keep abreast of vendor updates and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-26T19:11:33.301Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944f80919341fe18889df10

Added to database: 12/19/2025, 7:00:25 AM

Last enriched: 12/19/2025, 7:16:35 AM

Last updated: 12/19/2025, 8:44:46 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats