Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5919: CWE-862 Missing Authorization in arraytics Appointment Booking Calendar – WP Timetics Booking Plugin

0
Medium
VulnerabilityCVE-2025-5919cvecve-2025-5919cwe-862
Published: Tue Jan 06 2026 (01/06/2026, 08:21:49 UTC)
Source: CVE Database V5
Vendor/Project: arraytics
Product: Appointment Booking Calendar – WP Timetics Booking Plugin

Description

The Appointment Booking and Scheduling Calendar Plugin – WP Timetics plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the update and register_routes functions in all versions up to, and including, 1.0.36. This makes it possible for unauthenticated attackers to view and modify booking details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:39:29 UTC

Technical Analysis

CVE-2025-5919 is a vulnerability identified in the Appointment Booking Calendar – WP Timetics plugin for WordPress, affecting all versions up to 1.0.36. The root cause is a missing authorization check (CWE-862) in the plugin's update and register_routes functions, which are responsible for handling booking data updates and API route registrations. Because these functions lack proper capability verification, unauthenticated attackers can invoke them remotely to view and modify booking details without any authentication or user interaction. This results in unauthorized access to sensitive booking information and the ability to alter it, compromising data confidentiality and integrity. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope remains unchanged as the vulnerability affects only the plugin's data. Although no public exploits have been reported yet, the ease of exploitation and the sensitive nature of booking data make this a significant risk. The vulnerability highlights a common security oversight in WordPress plugin development where capability checks are omitted on critical functions, enabling privilege escalation and unauthorized data manipulation. Organizations using this plugin should monitor for updates or patches from the vendor and consider interim protective measures.

Potential Impact

The vulnerability allows unauthenticated attackers to access and modify booking data managed by the WP Timetics plugin, leading to potential exposure of sensitive customer information such as appointment times, personal details, and service records. This can result in privacy violations, reputational damage, and loss of customer trust. Altered booking data could disrupt business operations, cause scheduling conflicts, or enable fraudulent bookings. For organizations relying heavily on this plugin for client management, the integrity and reliability of their appointment system are compromised. Additionally, attackers could leverage this access as a foothold for further attacks within the WordPress environment or connected systems. The medium severity rating reflects moderate impact on confidentiality and integrity, with no direct availability impact. However, the ease of exploitation without authentication increases the urgency for remediation. The threat affects any organization using the vulnerable plugin, particularly those in service industries such as healthcare, legal, education, and personal services that rely on appointment scheduling.

Mitigation Recommendations

1. Apply vendor patches immediately once released to address the missing authorization checks in the update and register_routes functions. 2. Until patches are available, restrict access to the WordPress REST API endpoints related to the plugin using web application firewalls (WAFs) or server-level access controls to block unauthenticated requests targeting these functions. 3. Implement strict role-based access controls (RBAC) within WordPress to limit plugin management capabilities to trusted administrators only. 4. Monitor web server and WordPress logs for unusual or unauthorized access attempts to the plugin’s API routes or booking data endpoints. 5. Consider temporarily disabling or replacing the plugin with a more secure alternative if immediate patching is not feasible. 6. Conduct security audits of other installed plugins to ensure proper authorization checks are in place, preventing similar vulnerabilities. 7. Educate site administrators on the importance of timely plugin updates and security best practices for WordPress environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-06-09T10:11:13.131Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695cc9de3839e44175ff5dc3

Added to database: 1/6/2026, 8:37:50 AM

Last enriched: 2/27/2026, 3:39:29 PM

Last updated: 3/25/2026, 8:14:47 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses