Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5282: CWE-862 Missing Authorization in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software

0
High
VulnerabilityCVE-2025-5282cvecve-2025-5282cwe-862
Published: Fri Jun 13 2025 (06/13/2025, 03:41:45 UTC)
Source: CVE Database V5
Vendor/Project: wptravelengine
Product: WP Travel Engine – Tour Booking Plugin – Tour Operator Software

Description

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_package() function in all versions up to, and including, 6.5.1. This makes it possible for unauthenticated attackers to delete arbitrary posts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:10:21 UTC

Technical Analysis

CVE-2025-5282 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Travel Engine – Tour Booking Plugin for WordPress, a widely used plugin designed to facilitate tour booking and operator software functionalities. The issue arises from the delete_package() function lacking proper capability checks, allowing unauthenticated attackers to invoke this function and delete arbitrary posts without any authorization. This vulnerability affects all versions up to and including 6.5.1. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is primarily on integrity (I:H), as attackers can delete content, but confidentiality and availability are not directly affected. The vulnerability does not require authentication or user interaction, making it easy to exploit remotely. Although no known exploits have been reported in the wild yet, the potential for data loss and disruption to business operations is significant, especially for organizations relying on this plugin for managing tour bookings and related content. The lack of a patch at the time of reporting necessitates immediate mitigation measures to prevent exploitation.

Potential Impact

The primary impact of CVE-2025-5282 is unauthorized deletion of posts managed by the WP Travel Engine plugin, which can lead to significant data loss and disruption of tour booking services. This compromises the integrity of the affected websites, potentially causing loss of customer trust, operational downtime, and financial damage due to interrupted bookings or lost data. Since the vulnerability allows unauthenticated attackers to delete arbitrary posts, it can be exploited by remote attackers without any credentials, increasing the risk of widespread abuse. Organizations using this plugin may face reputational damage and operational challenges, especially those in the travel and tourism sector where timely and accurate booking information is critical. The absence of confidentiality or availability impact limits the scope to data integrity, but the critical nature of deleted content makes this a high-impact issue. Additionally, the ease of exploitation and lack of required privileges mean attackers can quickly leverage this vulnerability to cause harm.

Mitigation Recommendations

1. Immediately restrict access to the WP Travel Engine plugin's administrative and deletion functionalities by implementing web application firewall (WAF) rules that block unauthorized requests targeting the delete_package() function. 2. Employ WordPress security plugins or custom code to enforce strict capability checks on sensitive plugin functions until an official patch is released. 3. Monitor server and application logs for unusual deletion activities or repeated requests to the vulnerable endpoint to detect potential exploitation attempts early. 4. Regularly back up WordPress site data, including posts and plugin data, to enable rapid restoration in case of data deletion. 5. Coordinate with the plugin vendor or monitor official channels for the release of a security patch and apply it promptly once available. 6. Limit plugin usage to trusted administrators and consider temporarily disabling the plugin if the risk outweighs operational needs. 7. Conduct security audits and penetration testing focused on authorization controls within WordPress plugins to identify similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-27T16:31:42.141Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684ba0b6358c65714e6b6d1d

Added to database: 6/13/2025, 3:53:26 AM

Last enriched: 2/27/2026, 3:10:21 PM

Last updated: 3/23/2026, 7:25:18 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses