Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1704: CWE-639 Authorization Bypass Through User-Controlled Key in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin

0
Medium
VulnerabilityCVE-2026-1704cvecve-2026-1704cwe-639
Published: Fri Mar 13 2026 (03/13/2026, 07:23:38 UTC)
Source: CVE Database V5
Vendor/Project: croixhaug
Product: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin

Description

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.6.9.29. This is due to the `get_item_permissions_check` method granting access to users with the `ssa_manage_appointments` capability without validating staff ownership of the requested appointment. This makes it possible for authenticated attackers, with custom-level access and above (users granted the ssa_manage_appointments capability, such as Team Members), to view appointment records belonging to other staff members and access sensitive customer personally identifiable information via the appointment ID parameter.

AI-Powered Analysis

AILast updated: 03/13/2026, 08:00:35 UTC

Technical Analysis

The vulnerability CVE-2026-1704 affects the Simply Schedule Appointments Booking Plugin for WordPress, a widely used tool for managing appointment bookings. The core issue is an authorization bypass caused by improper access control in the get_item_permissions_check method. This method grants access to users possessing the ssa_manage_appointments capability without verifying whether the requested appointment belongs to the requesting staff member. As a result, authenticated users with this capability—typically Team Members or roles with similar privileges—can access appointment records of other staff members by manipulating the appointment ID parameter. This leads to exposure of sensitive customer data, including personally identifiable information (PII), violating confidentiality principles. The vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key), a form of Insecure Direct Object Reference (IDOR). The CVSS 3.1 score of 4.3 reflects a medium severity level, with the attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality only. No patches or exploits are currently documented, but the risk remains significant for organizations relying on this plugin without additional access controls. The flaw highlights the importance of enforcing strict ownership validation in multi-user environments to prevent unauthorized data disclosure.

Potential Impact

The primary impact of CVE-2026-1704 is unauthorized disclosure of sensitive customer information stored within appointment records. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, HIPAA), and reputational damage for organizations using the affected plugin. Attackers with legitimate but limited access (e.g., Team Members) can escalate their visibility to other users' appointments, potentially exposing names, contact details, appointment times, and other PII. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can facilitate further social engineering, phishing, or identity theft attacks. Organizations in sectors handling sensitive client data—such as healthcare, legal, consulting, and personal services—are particularly at risk. The medium CVSS score reflects that exploitation requires authenticated access with specific capabilities, limiting the attack surface but not eliminating risk. Failure to address this vulnerability could undermine trust in the booking system and lead to legal liabilities due to data exposure.

Mitigation Recommendations

To mitigate CVE-2026-1704, organizations should implement the following specific actions: 1) Immediately audit user roles and capabilities to ensure only trusted personnel have the ssa_manage_appointments capability, minimizing the number of users who can exploit this flaw. 2) Apply strict access control checks by modifying or patching the plugin to enforce staff ownership validation in the get_item_permissions_check method, ensuring users can only access their own appointment records. 3) If an official patch becomes available, prioritize timely deployment. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to access appointment IDs not owned by the requester. 5) Monitor logs for unusual access patterns or attempts to enumerate appointment IDs. 6) Educate staff about the sensitivity of appointment data and the importance of reporting suspicious activity. 7) Consider isolating or restricting the plugin’s administrative interface to trusted networks or VPNs to reduce exposure. 8) Regularly review and update WordPress plugins and dependencies to minimize vulnerabilities. These targeted steps go beyond generic advice by focusing on capability management, ownership validation, and proactive monitoring specific to this plugin’s architecture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-30T15:37:58.974Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3c0802f860ef943a8ad8f

Added to database: 3/13/2026, 7:45:04 AM

Last enriched: 3/13/2026, 8:00:35 AM

Last updated: 3/14/2026, 3:41:50 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses