CVE-2025-67574: Missing Authorization in wpdevart Booking calendar, Appointment Booking System
Missing Authorization vulnerability in wpdevart Booking calendar, Appointment Booking System booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through <= 3.2.30.
AI Analysis
Technical Summary
CVE-2025-67574 identifies a missing authorization vulnerability in the wpdevart Booking calendar and Appointment Booking System WordPress plugin, versions up to and including 3.2.30. The vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict user permissions. This flaw allows an attacker to perform unauthorized actions within the booking system, such as viewing, modifying, or deleting booking data without proper credentials. The plugin is commonly used to manage appointments and bookings on WordPress sites, making it a critical component for many businesses. The lack of authorization checks means that attackers could exploit the system remotely if the plugin is publicly accessible, potentially leading to data leakage or manipulation. No public exploits have been reported yet, and no CVSS score has been assigned, but the vulnerability's nature suggests a significant risk. The issue was published on December 9, 2025, by Patchstack, with no patch links currently available, indicating that users must monitor vendor updates closely. The vulnerability affects the confidentiality and integrity of sensitive booking information and could disrupt business operations if exploited.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of customer booking data, which may include personally identifiable information (PII) and sensitive appointment details. Unauthorized access could lead to data breaches, reputational damage, and potential regulatory penalties under GDPR. The availability of the booking system could also be indirectly impacted if attackers manipulate or delete booking records, causing operational disruptions. Sectors such as healthcare, legal, education, and service industries that rely heavily on appointment scheduling are particularly vulnerable. The absence of authentication requirements for exploitation increases the threat level, as attackers can remotely target vulnerable sites without prior access. This could lead to widespread exploitation if the plugin is widely deployed across European businesses without timely mitigation. Additionally, compromised booking systems could be leveraged for further attacks, such as phishing or social engineering, by using stolen appointment data.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the wpdevart Booking calendar and Appointment Booking System plugin, especially versions up to 3.2.30. Until an official patch is released, administrators should restrict access to booking system endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict role-based access controls within WordPress to minimize permissions for users interacting with the booking plugin. Monitor logs for unusual access patterns or unauthorized actions related to the booking system. Consider temporarily disabling the plugin if it is not critical to operations. Stay informed through vendor advisories and Patchstack updates to apply patches promptly once available. Additionally, conduct regular backups of booking data to enable recovery in case of data manipulation or loss. Employ security plugins that can detect and block unauthorized access attempts and consider penetration testing to identify other potential weaknesses in the booking system integration.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-67574: Missing Authorization in wpdevart Booking calendar, Appointment Booking System
Description
Missing Authorization vulnerability in wpdevart Booking calendar, Appointment Booking System booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through <= 3.2.30.
AI-Powered Analysis
Technical Analysis
CVE-2025-67574 identifies a missing authorization vulnerability in the wpdevart Booking calendar and Appointment Booking System WordPress plugin, versions up to and including 3.2.30. The vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict user permissions. This flaw allows an attacker to perform unauthorized actions within the booking system, such as viewing, modifying, or deleting booking data without proper credentials. The plugin is commonly used to manage appointments and bookings on WordPress sites, making it a critical component for many businesses. The lack of authorization checks means that attackers could exploit the system remotely if the plugin is publicly accessible, potentially leading to data leakage or manipulation. No public exploits have been reported yet, and no CVSS score has been assigned, but the vulnerability's nature suggests a significant risk. The issue was published on December 9, 2025, by Patchstack, with no patch links currently available, indicating that users must monitor vendor updates closely. The vulnerability affects the confidentiality and integrity of sensitive booking information and could disrupt business operations if exploited.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of customer booking data, which may include personally identifiable information (PII) and sensitive appointment details. Unauthorized access could lead to data breaches, reputational damage, and potential regulatory penalties under GDPR. The availability of the booking system could also be indirectly impacted if attackers manipulate or delete booking records, causing operational disruptions. Sectors such as healthcare, legal, education, and service industries that rely heavily on appointment scheduling are particularly vulnerable. The absence of authentication requirements for exploitation increases the threat level, as attackers can remotely target vulnerable sites without prior access. This could lead to widespread exploitation if the plugin is widely deployed across European businesses without timely mitigation. Additionally, compromised booking systems could be leveraged for further attacks, such as phishing or social engineering, by using stolen appointment data.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the wpdevart Booking calendar and Appointment Booking System plugin, especially versions up to 3.2.30. Until an official patch is released, administrators should restrict access to booking system endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict role-based access controls within WordPress to minimize permissions for users interacting with the booking plugin. Monitor logs for unusual access patterns or unauthorized actions related to the booking system. Consider temporarily disabling the plugin if it is not critical to operations. Stay informed through vendor advisories and Patchstack updates to apply patches promptly once available. Additionally, conduct regular backups of booking data to enable recovery in case of data manipulation or loss. Employ security plugins that can detect and block unauthorized access attempts and consider penetration testing to identify other potential weaknesses in the booking system integration.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:28.863Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ab29cea75c35ae56e6
Added to database: 12/9/2025, 2:35:23 PM
Last enriched: 12/9/2025, 3:05:46 PM
Last updated: 12/10/2025, 8:58:47 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67461: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Rooms
MediumCVE-2025-67460: CWE-693: Protection Mechanism Failure in Zoom Communications Inc. Zoom Rooms
HighCVE-2025-65950: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WBCE WBCE_CMS
CriticalCVE-2025-65828: n/a
UnknownCVE-2025-65827: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.