Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67472: Cross-Site Request Forgery (CSRF) in vcita Online Booking & Scheduling Calendar for WordPress by vcita

0
Unknown
VulnerabilityCVE-2025-67472cvecve-2025-67472
Published: Tue Dec 09 2025 (12/09/2025, 14:13:56 UTC)
Source: CVE Database V5
Vendor/Project: vcita
Product: Online Booking & Scheduling Calendar for WordPress by vcita

Description

Cross-Site Request Forgery (CSRF) vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita meeting-scheduler-by-vcita allows Cross Site Request Forgery.This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through <= 4.5.5.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:47:56 UTC

Technical Analysis

The vulnerability identified as CVE-2025-67472 is a Cross-Site Request Forgery (CSRF) issue in the vcita Online Booking & Scheduling Calendar plugin for WordPress, affecting versions up to and including 4.5.5. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform actions on behalf of the user without their intent. In this case, the vcita plugin, which manages online booking and scheduling functionalities, does not adequately verify the origin or authenticity of requests that modify booking data or settings. This lack of proper anti-CSRF protections means that if a logged-in user visits a malicious website, that site could send crafted requests to the vulnerable WordPress plugin, resulting in unauthorized changes such as creating, modifying, or deleting bookings or schedules. The vulnerability does not appear to have a CVSS score yet, and no public exploits have been reported, indicating it may be newly disclosed or not widely exploited. However, the impact on the integrity and availability of booking data can be significant, especially for organizations relying heavily on these services for customer interactions. The plugin is widely used among small and medium businesses that utilize WordPress for client scheduling, making the attack surface considerable. The vulnerability requires the victim to be authenticated on the WordPress site, but no additional user interaction beyond visiting a malicious page is necessary. This increases the risk of exploitation in environments where users maintain active sessions. The absence of patches at the time of disclosure means organizations must implement compensating controls until updates are available.

Potential Impact

For European organizations, the impact of this CSRF vulnerability can be substantial, particularly for businesses that depend on the vcita plugin for managing client appointments, such as healthcare providers, legal firms, consultants, and service-oriented SMEs. Unauthorized modification or deletion of booking data can disrupt operations, cause loss of customer trust, and potentially lead to financial losses due to missed appointments or double bookings. The integrity of scheduling data is critical for maintaining smooth business workflows, and any compromise could also affect compliance with data protection regulations like GDPR if personal data is mishandled. Additionally, attackers could leverage this vulnerability to perform further attacks by manipulating booking information or injecting malicious payloads if the plugin interfaces with other systems. The availability of the booking service could also be degraded if attackers repeatedly alter or delete schedules, causing denial of service to legitimate users. Given the widespread use of WordPress in Europe and the popularity of vcita among small businesses, the threat surface is significant. Organizations with less mature cybersecurity practices or those lacking timely patch management are particularly vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take immediate steps beyond waiting for an official patch. First, implement strict anti-CSRF tokens in all forms and requests related to booking management if possible, either by updating the plugin or applying custom code to validate request origins. Enforce session timeouts and require re-authentication for sensitive actions within the booking system to reduce the window of opportunity for CSRF attacks. Monitor web server logs and application logs for unusual or unauthorized booking changes, especially those originating from external referrers or suspicious IP addresses. Educate users to avoid clicking on unknown or untrusted links while logged into the WordPress admin interface. Restrict administrative access to the WordPress backend using IP whitelisting or VPNs where feasible. Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting the vcita plugin endpoints. Finally, maintain an active update policy to apply vendor patches promptly once released and subscribe to vulnerability advisories related to WordPress plugins.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-08T16:00:53.489Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a029cea75c35ae51f7

Added to database: 12/9/2025, 2:35:12 PM

Last enriched: 12/9/2025, 3:47:56 PM

Last updated: 12/11/2025, 7:06:04 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats