Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67574: Missing Authorization in wpdevart Booking calendar, Appointment Booking System

0
Medium
VulnerabilityCVE-2025-67574cvecve-2025-67574
Published: Tue Dec 09 2025 (12/09/2025, 14:14:13 UTC)
Source: CVE Database V5
Vendor/Project: wpdevart
Product: Booking calendar, Appointment Booking System

Description

Missing Authorization vulnerability in wpdevart Booking calendar, Appointment Booking System booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through <= 3.2.30.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:05:46 UTC

Technical Analysis

CVE-2025-67574 identifies a missing authorization vulnerability in the wpdevart Booking calendar and Appointment Booking System WordPress plugin, versions up to and including 3.2.30. The vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict user permissions. This flaw allows an attacker to perform unauthorized actions within the booking system, such as viewing, modifying, or deleting booking data without proper credentials. The plugin is commonly used to manage appointments and bookings on WordPress sites, making it a critical component for many businesses. The lack of authorization checks means that attackers could exploit the system remotely if the plugin is publicly accessible, potentially leading to data leakage or manipulation. No public exploits have been reported yet, and no CVSS score has been assigned, but the vulnerability's nature suggests a significant risk. The issue was published on December 9, 2025, by Patchstack, with no patch links currently available, indicating that users must monitor vendor updates closely. The vulnerability affects the confidentiality and integrity of sensitive booking information and could disrupt business operations if exploited.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of customer booking data, which may include personally identifiable information (PII) and sensitive appointment details. Unauthorized access could lead to data breaches, reputational damage, and potential regulatory penalties under GDPR. The availability of the booking system could also be indirectly impacted if attackers manipulate or delete booking records, causing operational disruptions. Sectors such as healthcare, legal, education, and service industries that rely heavily on appointment scheduling are particularly vulnerable. The absence of authentication requirements for exploitation increases the threat level, as attackers can remotely target vulnerable sites without prior access. This could lead to widespread exploitation if the plugin is widely deployed across European businesses without timely mitigation. Additionally, compromised booking systems could be leveraged for further attacks, such as phishing or social engineering, by using stolen appointment data.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the wpdevart Booking calendar and Appointment Booking System plugin, especially versions up to 3.2.30. Until an official patch is released, administrators should restrict access to booking system endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict role-based access controls within WordPress to minimize permissions for users interacting with the booking plugin. Monitor logs for unusual access patterns or unauthorized actions related to the booking system. Consider temporarily disabling the plugin if it is not critical to operations. Stay informed through vendor advisories and Patchstack updates to apply patches promptly once available. Additionally, conduct regular backups of booking data to enable recovery in case of data manipulation or loss. Employ security plugins that can detect and block unauthorized access attempts and consider penetration testing to identify other potential weaknesses in the booking system integration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:28.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ab29cea75c35ae56e6

Added to database: 12/9/2025, 2:35:23 PM

Last enriched: 12/9/2025, 3:05:46 PM

Last updated: 12/10/2025, 8:58:47 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats