Impact
The Course Booking System plugin for WordPress contains an authorization flaw that allows any visitor to download booking data without “edit_posts” or other capability checks. By requesting the csv-export.php endpoint, an unauthenticated user can receive a full CSV export of all stored bookings, exposing user information, dates, and contact details. The weakness is a missing capability check, identified as CWE‑862 and providing a direct path to sensitive data exposure.
Affected Systems
WordPress sites that use the Course Booking System plugin, version 6.1.5 or earlier. The issue exists in all releases up to and including 6.1.5.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate confidentiality impact with no authentication required. The EPSS score below 1% suggests a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the flaw simply by accessing the CSV export URL from any network that can reach the affected site, meaning the attack vector is network-based and does not require privileged credentials. Once the request is made, the exported data is returned without further checks.
OpenCVE Enrichment