CVE-2025-5948: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to claiming a business when using the claim_business AJAX action. This makes it possible for unauthenticated attackers to login as any user including admins. Please note that subscriber privileges or brute-forcing are needed when completing the business takeover. The claim_id is needed to takeover the admin account, but brute-forcing is a practical approach to obtaining valid IDs.
AI Analysis
Technical Summary
CVE-2025-5948 is a critical authorization bypass vulnerability classified under CWE-639, affecting the Service Finder Bookings plugin for WordPress developed by aonetheme. The vulnerability exists in the claim_business AJAX action, where the plugin fails to properly validate the identity of users attempting to claim a business listing. This flaw allows unauthenticated attackers to escalate privileges by taking over accounts, including administrative users. The attack requires either subscriber privileges or brute forcing to obtain valid claim_id parameters, which are used to identify business claims. Because the claim_id can be brute forced practically, attackers can impersonate any user, including admins, leading to full site compromise. The vulnerability impacts all versions up to and including 6.0 of the plugin. The CVSS 3.1 base score is 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No official patches or fixes have been released as of now, and no known exploits have been reported in the wild. The vulnerability was reserved in June 2025 and published in September 2025. This flaw poses a significant risk to WordPress sites using this plugin, potentially allowing attackers to gain complete control over the site and its data.
Potential Impact
The impact of CVE-2025-5948 is severe for organizations running WordPress sites with the vulnerable Service Finder Bookings plugin. Successful exploitation allows attackers to take over any user account, including administrators, leading to full site compromise. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code, disruption of services, and use of the compromised site as a launchpad for further attacks. The vulnerability undermines the confidentiality, integrity, and availability of the affected systems. Given the plugin's use in service booking and business listings, attackers could manipulate business information or disrupt customer interactions, damaging reputation and trust. The ease of exploitation without authentication or user interaction increases the risk of widespread attacks. Organizations may face regulatory and compliance consequences if customer data is exposed. The lack of patches exacerbates the threat, requiring immediate mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately disable or deactivate the Service Finder Bookings plugin until a security patch is released. 2. Monitor and restrict access to the claim_business AJAX endpoint using web application firewalls (WAF) or custom rules to block suspicious requests, especially those attempting to brute force claim_id values. 3. Implement rate limiting on AJAX endpoints to reduce the feasibility of brute force attacks. 4. Enforce strong subscriber account security policies, including multi-factor authentication (MFA) and strong password requirements, to reduce the risk of privilege abuse. 5. Audit existing user accounts and business claims for unauthorized changes or suspicious activity. 6. Keep WordPress core and all plugins updated and subscribe to security advisories from the plugin vendor and WordPress security communities. 7. Prepare incident response plans to quickly respond to potential exploitation. 8. Consider isolating or sandboxing the plugin functionality if disabling is not feasible, limiting its access to critical resources. 9. Once a patch is available, apply it immediately and verify the fix through testing. 10. Educate site administrators about the risks and signs of compromise related to this vulnerability.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Netherlands, Japan
CVE-2025-5948: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
Description
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to claiming a business when using the claim_business AJAX action. This makes it possible for unauthenticated attackers to login as any user including admins. Please note that subscriber privileges or brute-forcing are needed when completing the business takeover. The claim_id is needed to takeover the admin account, but brute-forcing is a practical approach to obtaining valid IDs.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5948 is a critical authorization bypass vulnerability classified under CWE-639, affecting the Service Finder Bookings plugin for WordPress developed by aonetheme. The vulnerability exists in the claim_business AJAX action, where the plugin fails to properly validate the identity of users attempting to claim a business listing. This flaw allows unauthenticated attackers to escalate privileges by taking over accounts, including administrative users. The attack requires either subscriber privileges or brute forcing to obtain valid claim_id parameters, which are used to identify business claims. Because the claim_id can be brute forced practically, attackers can impersonate any user, including admins, leading to full site compromise. The vulnerability impacts all versions up to and including 6.0 of the plugin. The CVSS 3.1 base score is 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No official patches or fixes have been released as of now, and no known exploits have been reported in the wild. The vulnerability was reserved in June 2025 and published in September 2025. This flaw poses a significant risk to WordPress sites using this plugin, potentially allowing attackers to gain complete control over the site and its data.
Potential Impact
The impact of CVE-2025-5948 is severe for organizations running WordPress sites with the vulnerable Service Finder Bookings plugin. Successful exploitation allows attackers to take over any user account, including administrators, leading to full site compromise. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code, disruption of services, and use of the compromised site as a launchpad for further attacks. The vulnerability undermines the confidentiality, integrity, and availability of the affected systems. Given the plugin's use in service booking and business listings, attackers could manipulate business information or disrupt customer interactions, damaging reputation and trust. The ease of exploitation without authentication or user interaction increases the risk of widespread attacks. Organizations may face regulatory and compliance consequences if customer data is exposed. The lack of patches exacerbates the threat, requiring immediate mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediately disable or deactivate the Service Finder Bookings plugin until a security patch is released. 2. Monitor and restrict access to the claim_business AJAX endpoint using web application firewalls (WAF) or custom rules to block suspicious requests, especially those attempting to brute force claim_id values. 3. Implement rate limiting on AJAX endpoints to reduce the feasibility of brute force attacks. 4. Enforce strong subscriber account security policies, including multi-factor authentication (MFA) and strong password requirements, to reduce the risk of privilege abuse. 5. Audit existing user accounts and business claims for unauthorized changes or suspicious activity. 6. Keep WordPress core and all plugins updated and subscribe to security advisories from the plugin vendor and WordPress security communities. 7. Prepare incident response plans to quickly respond to potential exploitation. 8. Consider isolating or sandboxing the plugin functionality if disabling is not feasible, limiting its access to critical resources. 9. Once a patch is available, apply it immediately and verify the fix through testing. 10. Educate site administrators about the risks and signs of compromise related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-09T18:21:57.104Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cd76f94b8a032c4faa639c
Added to database: 9/19/2025, 3:30:01 PM
Last enriched: 2/27/2026, 3:44:48 PM
Last updated: 3/25/2026, 5:48:56 AM
Views: 540
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.