CVE-2026-27405: CWE-862 Missing Authorization in Magepeople inc. WpBookingly
Missing Authorization vulnerability in Magepeople inc. WpBookingly allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpBookingly: from n/a through 1.2.9.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-27405 in Magepeople inc.'s WpBookingly plugin is classified under CWE-862 (Missing Authorization). It affects versions up to 1.2.9 and allows exploitation due to improperly configured access control, potentially enabling users with certain privileges to carry out unauthorized operations. The CVSS v3.1 base score is 6.5, with the vector indicating network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts.
Potential Impact
The vulnerability can lead to unauthorized modification or disruption of the affected system's integrity and availability by users who have high privileges but should not be authorized for certain actions. There is no confidentiality impact reported. No known exploits have been observed in the wild, so the immediate risk appears limited but could increase if exploitation techniques emerge.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or temporary mitigation is provided, users should monitor Magepeople inc.'s advisories for updates. Until a patch is available, carefully review and restrict user privileges to minimize potential exploitation.
CVE-2026-27405: CWE-862 Missing Authorization in Magepeople inc. WpBookingly
Description
Missing Authorization vulnerability in Magepeople inc. WpBookingly allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpBookingly: from n/a through 1.2.9.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-27405 in Magepeople inc.'s WpBookingly plugin is classified under CWE-862 (Missing Authorization). It affects versions up to 1.2.9 and allows exploitation due to improperly configured access control, potentially enabling users with certain privileges to carry out unauthorized operations. The CVSS v3.1 base score is 6.5, with the vector indicating network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts.
Potential Impact
The vulnerability can lead to unauthorized modification or disruption of the affected system's integrity and availability by users who have high privileges but should not be authorized for certain actions. There is no confidentiality impact reported. No known exploits have been observed in the wild, so the immediate risk appears limited but could increase if exploitation techniques emerge.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or temporary mitigation is provided, users should monitor Magepeople inc.'s advisories for updates. Until a patch is available, carefully review and restrict user privileges to minimize potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-02-19T09:52:08.215Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0db4daba1db473627ecd1a
Added to database: 5/20/2026, 1:19:22 PM
Last enriched: 5/20/2026, 1:37:12 PM
Last updated: 5/20/2026, 3:39:32 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.