Impact
The Booking Calendar | Appointment Booking | Bookit plugin exposes a REST endpoint that lacks a proper capability check, permitting an unauthenticated attacker to link their own Stripe account and receive future payments. This flaw results in unauthorized modification of the payment routing and potential loss of revenue for the site owner.
Affected Systems
The vulnerability is present in version 2.5.0 and earlier of the Bookit plugin for WordPress, affecting any site that installs these releases without further remediation.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1% suggests a low current exploitation probability, and the flaw is not listed in the CISA KEV catalog. Attackers can exploit the unauthenticated '/wp-json/bookit/v1/commerce/stripe/return' endpoint by crafting a request that binds their own Stripe account, without needing credentials or prior permissions.
OpenCVE Enrichment