Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8492: CWE-862 Missing Authorization in wordpresschef Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses

0
Medium
VulnerabilityCVE-2025-8492cvecve-2025-8492cwe-862
Published: Thu Sep 11 2025 (09/11/2025, 07:24:56 UTC)
Source: CVE Database V5
Vendor/Project: wordpresschef
Product: Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses

Description

The Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax function in all versions up to, and including, 10.20. This makes it possible for unauthenticated attackers to execute AJAX actions, including limited file uploads.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:13:14 UTC

Technical Analysis

CVE-2025-8492 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses' developed by wordpresschef. The vulnerability exists because the plugin fails to perform proper capability checks on an AJAX function, which is accessible without authentication. This flaw allows unauthenticated attackers to invoke AJAX actions that should be restricted, including limited file uploads. The absence of authorization checks means attackers can modify data or upload files without permission, potentially leading to data integrity issues or further exploitation if uploaded files are leveraged maliciously. The vulnerability affects all plugin versions up to and including 10.20. The CVSS 3.1 base score is 5.3, indicating a medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to integrity without affecting confidentiality or availability. No patches or known exploits are currently available, but the vulnerability poses a risk to WordPress sites using this plugin, particularly those managing appointment and booking data for salons, spas, and small businesses.

Potential Impact

The primary impact of CVE-2025-8492 is unauthorized modification of data within the affected WordPress plugin, which can undermine the integrity of booking and scheduling information. This can disrupt business operations for salons, spas, and small businesses relying on accurate appointment data. The ability to perform limited file uploads without authorization raises the risk of attackers uploading malicious files, potentially leading to further compromise such as webshell deployment or pivoting within the hosting environment. Although confidentiality and availability are not directly impacted, data integrity issues can cause operational disruptions and loss of customer trust. Organizations worldwide using this plugin may face reputational damage, customer dissatisfaction, and potential regulatory scrutiny if customer data is altered or service is disrupted. The lack of authentication and user interaction requirements makes exploitation relatively straightforward for remote attackers scanning for vulnerable sites.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress sites for the presence of the 'Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses' plugin and identify the installed version. Until an official patch is released, consider disabling or removing the plugin to eliminate exposure. If the plugin is essential, restrict access to the affected AJAX endpoints using web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. Monitor web server logs for suspicious AJAX activity or unexpected file uploads. Implement strict file upload validation and scanning to detect and quarantine potentially malicious files. Regularly back up booking and scheduling data to enable recovery in case of unauthorized modifications. Stay informed about vendor updates and apply patches promptly once available. Additionally, consider isolating WordPress environments and limiting plugin usage to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-01T22:55:38.339Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a22e1c560fa9d94d463

Added to database: 9/11/2025, 7:28:34 AM

Last enriched: 2/26/2026, 5:13:14 PM

Last updated: 3/25/2026, 5:47:11 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses