CVE-2026-1932: CWE-862 Missing Authorization in bssoftware Appointment Booking Calendar Plugin – Bookr
The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update-appointment REST API endpoint in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to modify the status of any appointment.
AI Analysis
Technical Summary
CVE-2026-1932 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Appointment Booking Calendar Plugin – Bookr for WordPress, affecting all versions up to and including 1.0.2. The core issue is the absence of a capability check on the update-appointment REST API endpoint, which is responsible for modifying appointment data. This lack of authorization verification allows unauthenticated attackers to remotely alter the status of any appointment without requiring credentials or user interaction. The vulnerability impacts the integrity of appointment data, potentially leading to unauthorized changes such as cancellations, rescheduling, or false confirmations. The CVSS v3.1 score of 5.3 (medium severity) reflects the network attack vector, low attack complexity, no privileges required, and no user interaction needed. While confidentiality and availability are not directly impacted, the integrity compromise can disrupt business operations relying on accurate appointment management. No patches or known exploits are currently reported, but the vulnerability's nature makes it a candidate for exploitation once weaponized. The plugin's widespread use in service-oriented businesses increases the risk profile, especially where appointment accuracy is critical. The vulnerability highlights the importance of proper authorization checks in REST API endpoints within WordPress plugins.
Potential Impact
For European organizations, the unauthorized modification of appointment statuses can lead to operational disruptions, customer dissatisfaction, and reputational damage. Service providers such as healthcare clinics, legal firms, educational institutions, and other appointment-driven businesses using the Bookr plugin may experience scheduling chaos, missed appointments, or fraudulent appointment confirmations. This can result in financial losses and reduced trust from clients. Although the vulnerability does not expose sensitive personal data directly, the integrity breach can indirectly affect confidentiality if appointment data is linked to personal information. The ease of exploitation without authentication increases the threat level, especially for organizations that do not monitor or restrict REST API access. In regulated sectors, such as healthcare or finance, such disruptions could also lead to compliance issues under GDPR or sector-specific regulations. The medium severity rating suggests a moderate but tangible risk that warrants timely mitigation to prevent exploitation.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the WordPress REST API endpoints via web application firewalls (WAFs) or server-level access controls to limit requests to trusted IP addresses or authenticated users only. Administrators can disable or restrict the update-appointment endpoint temporarily if feasible. Monitoring REST API logs for unusual or unauthorized requests targeting appointment modification endpoints is critical for early detection. Organizations should also ensure WordPress core and all plugins are kept up to date and subscribe to security advisories from the plugin vendor and WordPress security communities. Once a patch is released, prompt application is essential. Additionally, implementing multi-factor authentication for WordPress admin accounts and limiting plugin installation to trusted sources reduces overall risk. Educating staff about potential appointment manipulation and establishing incident response procedures for scheduling anomalies will further enhance resilience.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1932: CWE-862 Missing Authorization in bssoftware Appointment Booking Calendar Plugin – Bookr
Description
The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update-appointment REST API endpoint in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to modify the status of any appointment.
AI-Powered Analysis
Technical Analysis
CVE-2026-1932 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Appointment Booking Calendar Plugin – Bookr for WordPress, affecting all versions up to and including 1.0.2. The core issue is the absence of a capability check on the update-appointment REST API endpoint, which is responsible for modifying appointment data. This lack of authorization verification allows unauthenticated attackers to remotely alter the status of any appointment without requiring credentials or user interaction. The vulnerability impacts the integrity of appointment data, potentially leading to unauthorized changes such as cancellations, rescheduling, or false confirmations. The CVSS v3.1 score of 5.3 (medium severity) reflects the network attack vector, low attack complexity, no privileges required, and no user interaction needed. While confidentiality and availability are not directly impacted, the integrity compromise can disrupt business operations relying on accurate appointment management. No patches or known exploits are currently reported, but the vulnerability's nature makes it a candidate for exploitation once weaponized. The plugin's widespread use in service-oriented businesses increases the risk profile, especially where appointment accuracy is critical. The vulnerability highlights the importance of proper authorization checks in REST API endpoints within WordPress plugins.
Potential Impact
For European organizations, the unauthorized modification of appointment statuses can lead to operational disruptions, customer dissatisfaction, and reputational damage. Service providers such as healthcare clinics, legal firms, educational institutions, and other appointment-driven businesses using the Bookr plugin may experience scheduling chaos, missed appointments, or fraudulent appointment confirmations. This can result in financial losses and reduced trust from clients. Although the vulnerability does not expose sensitive personal data directly, the integrity breach can indirectly affect confidentiality if appointment data is linked to personal information. The ease of exploitation without authentication increases the threat level, especially for organizations that do not monitor or restrict REST API access. In regulated sectors, such as healthcare or finance, such disruptions could also lead to compliance issues under GDPR or sector-specific regulations. The medium severity rating suggests a moderate but tangible risk that warrants timely mitigation to prevent exploitation.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the WordPress REST API endpoints via web application firewalls (WAFs) or server-level access controls to limit requests to trusted IP addresses or authenticated users only. Administrators can disable or restrict the update-appointment endpoint temporarily if feasible. Monitoring REST API logs for unusual or unauthorized requests targeting appointment modification endpoints is critical for early detection. Organizations should also ensure WordPress core and all plugins are kept up to date and subscribe to security advisories from the plugin vendor and WordPress security communities. Once a patch is released, prompt application is essential. Additionally, implementing multi-factor authentication for WordPress admin accounts and limiting plugin installation to trusted sources reduces overall risk. Educating staff about potential appointment manipulation and establishing incident response procedures for scheduling anomalies will further enhance resilience.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-04T21:01:43.286Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699010d0c9e1ff5ad864b5b1
Added to database: 2/14/2026, 6:06:08 AM
Last enriched: 2/14/2026, 6:18:27 AM
Last updated: 2/21/2026, 12:01:02 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.