Description
The Booking Calendar plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 10.14.10 via the `WPBC_FLEXTIMELINE_NAV` AJAX action. This is due to the nonce verification being conditionally disabled by default (`booking_is_nonce_at_front_end` option is `'Off'` by default). When the `booking_is_show_popover_in_timeline_front_end` option is enabled (which is the default in demo installations and can be enabled by administrators), it is possible for unauthenticated attackers to extract sensitive booking data including customer names, email addresses, phone numbers, and booking details.
Published: 2026-01-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The Booking Calendar plugin for WordPress contains a vulnerability that allows unauthenticated users to expose private booking data. The flaw exists in the WPBC_FLEXTIMELINE_NAV AJAX action and is caused by a nonce check that is disabled by default when the booking_is_nonce_at_front_end option is set to Off. When the booking_is_show_popover_in_timeline_front_end option is enabled, which is the default on demo setups, attackers can retrieve customer names, email addresses, phone numbers, and other booking details without needing credentials.

Affected Systems

The issue affects all installations of the wpdevelop Booking Calendar plugin up to and including version 10.14.10. Any WordPress site running a vulnerable version is at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity of the defect, and an EPSS score of less than 1% reflects a very low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit the flaw by sending an AJAX request to the WPBC_FLEXTIMELINE_NAV endpoint, bypassing authentication due to the disabled nonce verification, and sequentially harvesting sensitive booking records.

Generated by OpenCVE AI on April 22, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Booking Calendar to version 10.14.11 or newer.
  • If an upgrade cannot be performed immediately, configure the "booking_is_nonce_at_front_end" option to "On" to re‑enable nonce protection for AJAX calls.
  • Disable the "booking_is_show_popover_in_timeline_front_end" feature or set its option to "Off" to prevent the extension of vulnerable data exposure.

Generated by OpenCVE AI on April 22, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpdevelop
Wpdevelop booking Calendar
Vendors & Products Wordpress
Wordpress wordpress
Wpdevelop
Wpdevelop booking Calendar

Fri, 09 Jan 2026 07:30:00 +0000

Type Values Removed Values Added
Description The Booking Calendar plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 10.14.10 via the `WPBC_FLEXTIMELINE_NAV` AJAX action. This is due to the nonce verification being conditionally disabled by default (`booking_is_nonce_at_front_end` option is `'Off'` by default). When the `booking_is_show_popover_in_timeline_front_end` option is enabled (which is the default in demo installations and can be enabled by administrators), it is possible for unauthenticated attackers to extract sensitive booking data including customer names, email addresses, phone numbers, and booking details.
Title Booking Calendar <= 10.14.10 - Unauthenticated Sensitive Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
Wpdevelop Booking Calendar
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:02.219Z

Reserved: 2025-12-05T18:52:20.067Z

Link: CVE-2025-14146

cve-icon Vulnrichment

Updated: 2026-01-09T19:18:27.178Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T08:15:57.330

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:45:20Z

Weaknesses