CVE-2025-67597: Missing Authorization in Shahjahan Jewel Fluent Booking
Missing Authorization vulnerability in Shahjahan Jewel Fluent Booking fluent-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fluent Booking: from n/a through <= 1.9.11.
AI Analysis
Technical Summary
CVE-2025-67597 is a Missing Authorization vulnerability identified in Shahjahan Jewel's Fluent Booking software, affecting versions up to 1.9.11. The vulnerability stems from incorrectly configured access control security levels, which means that certain functions or data within the application can be accessed without proper authorization checks. This flaw allows an unauthenticated attacker, or one without elevated privileges, to exploit the system by tricking a user into performing an action (user interaction required), potentially exposing confidential information. The CVSS 3.1 base score of 4.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). The vulnerability does not appear to have known exploits in the wild yet, but the misconfiguration of access controls is a common and critical security issue that can lead to unauthorized data access or leakage. The lack of patches at the time of publication suggests that organizations must proactively audit their access control settings and monitor for updates from the vendor. The vulnerability is particularly relevant for organizations using Fluent Booking to manage appointments or bookings, as unauthorized access could expose sensitive customer or business data.
Potential Impact
For European organizations, the primary impact of CVE-2025-67597 is the potential unauthorized disclosure of confidential booking or customer data managed through Fluent Booking. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. Since the vulnerability does not affect integrity or availability, the risk of data tampering or service disruption is low. However, unauthorized access to sensitive information can facilitate further attacks such as social engineering or targeted phishing. Industries with high reliance on booking systems, such as healthcare, hospitality, and professional services, are particularly at risk. The medium severity score indicates that while the vulnerability is not critical, it still represents a significant security concern that should be addressed promptly to avoid exploitation, especially as user interaction is required, which could be induced via phishing or social engineering campaigns.
Mitigation Recommendations
1. Immediately audit and review all access control configurations within Fluent Booking to ensure that authorization checks are correctly implemented for all sensitive functions and data. 2. Implement strict role-based access controls (RBAC) to limit user permissions to the minimum necessary. 3. Educate users about the risks of social engineering and phishing attacks that could trigger exploitation requiring user interaction. 4. Monitor network and application logs for unusual access patterns or unauthorized attempts to access restricted functions. 5. Apply vendor patches or updates as soon as they become available to address this vulnerability. 6. If patches are not yet available, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting access control weaknesses. 7. Conduct penetration testing focused on access control mechanisms to identify and remediate similar misconfigurations. 8. Ensure that sensitive booking data is encrypted both at rest and in transit to minimize exposure in case of unauthorized access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-67597: Missing Authorization in Shahjahan Jewel Fluent Booking
Description
Missing Authorization vulnerability in Shahjahan Jewel Fluent Booking fluent-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fluent Booking: from n/a through <= 1.9.11.
AI-Powered Analysis
Technical Analysis
CVE-2025-67597 is a Missing Authorization vulnerability identified in Shahjahan Jewel's Fluent Booking software, affecting versions up to 1.9.11. The vulnerability stems from incorrectly configured access control security levels, which means that certain functions or data within the application can be accessed without proper authorization checks. This flaw allows an unauthenticated attacker, or one without elevated privileges, to exploit the system by tricking a user into performing an action (user interaction required), potentially exposing confidential information. The CVSS 3.1 base score of 4.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). The vulnerability does not appear to have known exploits in the wild yet, but the misconfiguration of access controls is a common and critical security issue that can lead to unauthorized data access or leakage. The lack of patches at the time of publication suggests that organizations must proactively audit their access control settings and monitor for updates from the vendor. The vulnerability is particularly relevant for organizations using Fluent Booking to manage appointments or bookings, as unauthorized access could expose sensitive customer or business data.
Potential Impact
For European organizations, the primary impact of CVE-2025-67597 is the potential unauthorized disclosure of confidential booking or customer data managed through Fluent Booking. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. Since the vulnerability does not affect integrity or availability, the risk of data tampering or service disruption is low. However, unauthorized access to sensitive information can facilitate further attacks such as social engineering or targeted phishing. Industries with high reliance on booking systems, such as healthcare, hospitality, and professional services, are particularly at risk. The medium severity score indicates that while the vulnerability is not critical, it still represents a significant security concern that should be addressed promptly to avoid exploitation, especially as user interaction is required, which could be induced via phishing or social engineering campaigns.
Mitigation Recommendations
1. Immediately audit and review all access control configurations within Fluent Booking to ensure that authorization checks are correctly implemented for all sensitive functions and data. 2. Implement strict role-based access controls (RBAC) to limit user permissions to the minimum necessary. 3. Educate users about the risks of social engineering and phishing attacks that could trigger exploitation requiring user interaction. 4. Monitor network and application logs for unusual access patterns or unauthorized attempts to access restricted functions. 5. Apply vendor patches or updates as soon as they become available to address this vulnerability. 6. If patches are not yet available, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting access control weaknesses. 7. Conduct penetration testing focused on access control mechanisms to identify and remediate similar misconfigurations. 8. Ensure that sensitive booking data is encrypted both at rest and in transit to minimize exposure in case of unauthorized access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:48.326Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833b029cea75c35ae578c
Added to database: 12/9/2025, 2:35:28 PM
Last enriched: 1/21/2026, 1:07:45 AM
Last updated: 2/7/2026, 11:20:53 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.