Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6814: CWE-862 Missing Authorization in dunskii Booking X – Appointment and Reservation Availability Calendar

0
High
VulnerabilityCVE-2025-6814cvecve-2025-6814cwe-862
Published: Fri Jul 04 2025 (07/04/2025, 01:44:04 UTC)
Source: CVE Database V5
Vendor/Project: dunskii
Product: Booking X – Appointment and Reservation Availability Calendar

Description

The Booking X plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_now() function in versions 1.0 to 1.1.2. This makes it possible for unauthenticated attackers to download all plugin data, including user accounts, user meta, and PayPal credentials, by issuing a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:52:41 UTC

Technical Analysis

CVE-2025-6814 is a vulnerability identified in the Booking X – Appointment and Reservation Availability Calendar WordPress plugin developed by dunskii, affecting versions 1.0 through 1.1.2. The root cause is a missing authorization check (CWE-862) on the export_now() function, which is responsible for exporting plugin data. Due to the absence of capability verification, unauthenticated attackers can issue a specially crafted POST request to this function and retrieve all stored plugin data. This data includes sensitive information such as user accounts, user meta information, and PayPal credentials, which could be leveraged for further attacks or financial fraud. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is primarily on confidentiality, with no direct impact on integrity or availability. No patches have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on July 4, 2025, and was reserved on June 27, 2025. The plugin is widely used in WordPress environments for booking and reservation management, making the vulnerability relevant to many organizations relying on this software for appointment scheduling and e-commerce transactions.

Potential Impact

The impact of CVE-2025-6814 is significant for organizations using the affected Booking X plugin versions. Unauthorized access to user accounts and metadata can lead to identity theft, phishing, and unauthorized account takeovers. Exposure of PayPal credentials poses a direct financial risk, potentially enabling fraudulent transactions or theft of funds. The confidentiality breach can damage organizational reputation and lead to regulatory penalties, especially under data protection laws like GDPR or CCPA. Since the vulnerability requires no authentication and can be exploited remotely, attackers can automate exploitation at scale, increasing the risk of widespread data breaches. Organizations relying on this plugin for customer bookings and payments may face operational disruptions if attackers leverage stolen credentials to manipulate bookings or payments. The absence of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and sensitive data involved make this a critical threat to address promptly.

Mitigation Recommendations

To mitigate CVE-2025-6814, organizations should immediately audit their WordPress installations to identify the presence of the Booking X plugin versions 1.0 through 1.1.2. If found, the plugin should be disabled or removed until a vendor patch is released. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to block or monitor POST requests targeting the export_now() function endpoint or suspicious export data requests. Restricting access to the plugin’s export functionality by IP whitelisting or requiring authentication via custom code or security plugins can reduce risk. Regularly monitoring server logs for unusual POST requests and anomalous data export activity is critical for early detection. Organizations should also review and rotate PayPal credentials and other sensitive data potentially exposed. Finally, maintain up-to-date backups and prepare incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-27T15:57:14.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fd8

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 2/26/2026, 3:52:41 PM

Last updated: 3/23/2026, 2:30:12 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses