Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1932: CWE-862 Missing Authorization in bssoftware Appointment Booking Calendar Plugin – Bookr

0
Medium
VulnerabilityCVE-2026-1932cvecve-2026-1932cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 05:54:12 UTC)
Source: CVE Database V5
Vendor/Project: bssoftware
Product: Appointment Booking Calendar Plugin – Bookr

Description

The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update-appointment REST API endpoint in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to modify the status of any appointment.

AI-Powered Analysis

AILast updated: 02/14/2026, 06:18:27 UTC

Technical Analysis

CVE-2026-1932 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Appointment Booking Calendar Plugin – Bookr for WordPress, affecting all versions up to and including 1.0.2. The core issue is the absence of a capability check on the update-appointment REST API endpoint, which is responsible for modifying appointment data. This lack of authorization verification allows unauthenticated attackers to remotely alter the status of any appointment without requiring credentials or user interaction. The vulnerability impacts the integrity of appointment data, potentially leading to unauthorized changes such as cancellations, rescheduling, or false confirmations. The CVSS v3.1 score of 5.3 (medium severity) reflects the network attack vector, low attack complexity, no privileges required, and no user interaction needed. While confidentiality and availability are not directly impacted, the integrity compromise can disrupt business operations relying on accurate appointment management. No patches or known exploits are currently reported, but the vulnerability's nature makes it a candidate for exploitation once weaponized. The plugin's widespread use in service-oriented businesses increases the risk profile, especially where appointment accuracy is critical. The vulnerability highlights the importance of proper authorization checks in REST API endpoints within WordPress plugins.

Potential Impact

For European organizations, the unauthorized modification of appointment statuses can lead to operational disruptions, customer dissatisfaction, and reputational damage. Service providers such as healthcare clinics, legal firms, educational institutions, and other appointment-driven businesses using the Bookr plugin may experience scheduling chaos, missed appointments, or fraudulent appointment confirmations. This can result in financial losses and reduced trust from clients. Although the vulnerability does not expose sensitive personal data directly, the integrity breach can indirectly affect confidentiality if appointment data is linked to personal information. The ease of exploitation without authentication increases the threat level, especially for organizations that do not monitor or restrict REST API access. In regulated sectors, such as healthcare or finance, such disruptions could also lead to compliance issues under GDPR or sector-specific regulations. The medium severity rating suggests a moderate but tangible risk that warrants timely mitigation to prevent exploitation.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the WordPress REST API endpoints via web application firewalls (WAFs) or server-level access controls to limit requests to trusted IP addresses or authenticated users only. Administrators can disable or restrict the update-appointment endpoint temporarily if feasible. Monitoring REST API logs for unusual or unauthorized requests targeting appointment modification endpoints is critical for early detection. Organizations should also ensure WordPress core and all plugins are kept up to date and subscribe to security advisories from the plugin vendor and WordPress security communities. Once a patch is released, prompt application is essential. Additionally, implementing multi-factor authentication for WordPress admin accounts and limiting plugin installation to trusted sources reduces overall risk. Educating staff about potential appointment manipulation and establishing incident response procedures for scheduling anomalies will further enhance resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-04T21:01:43.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699010d0c9e1ff5ad864b5b1

Added to database: 2/14/2026, 6:06:08 AM

Last enriched: 2/14/2026, 6:18:27 AM

Last updated: 2/21/2026, 12:01:02 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats