Impact
The Awesome Hotel Booking plugin for WordPress suffers from an incorrect authorization mechanism in the room-single.php shortcode handler. The plugin validates only a nonce, with no check for user capabilities, allowing an unauthenticated attacker to modify any booking record if the attacker can obtain a nonce from the public booking form. This flaw compromises the integrity of reservation data, potentially enabling fraudulent bookings or cancellations and creating financial or reputational damage for the business using the plugin.
Affected Systems
The vulnerability is present in all versions of the Awesome Hotel Booking plugin up to and including 1.0.3, developed by the vendor nahian91. The affected environment is a WordPress installation that hosts the plugin’s booking functionality.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability does not appear in the CISA KEV catalog. The likely attack vector is a remote web-based request; an attacker needs only to read the public booking form output to retrieve the nonce and then craft a request to alter payment and booking details without any authentication.
OpenCVE Enrichment