Description
The Booking Calendar plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Exposure in all versions up to, and including, 10.14.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view all booking records in the database, including personally identifiable information (PII) such as names, email addresses, phone numbers, physical addresses, payment status, booking costs, and booking hashes belonging to other users.
Published: 2026-01-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The Booking Calendar plugin for WordPress suffers from a missing authorization check that allows authenticated users with Subscriber-level role or higher to view all booking records stored in the database. The exposed data includes personally identifiable information such as names, e‑mails, phone numbers, physical addresses, payment status, booking costs and booking hashes. Because the flaw can be triggered through normal plugin functionality, an attacker who can log in can harvest sensitive data across all bookings on the site.

Affected Systems

This vulnerability affects all released versions of Booking Calendar up to and including version 10.14.11. The plugin, published by wpdevelop, is used in any WordPress installation that has installed this plugin. No specific sub‑version or patch is listed; the issue exists in all revisions prior to 10.14.12.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate risk, and the EPSS score of less than 1% shows a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is primarily through normal logged‑in use; any authenticated user with Subscriber role or higher can trigger the flaw. Therefore, sites with many subscriber accounts face a significant risk of data exposure if the plugin is not updated.

Generated by OpenCVE AI on April 22, 2026 at 15:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Booking Calendar plugin to version 10.14.12 or later, which implements an authorization check for booking data.
  • If an immediate update is not possible, restrict access to the booking list page and related endpoints so that only Administrator users (or a custom role with explicit permission) can view bookings, preventing Subscriber-level users from requesting booking listings.
  • Audit any custom code that accesses booking data and add the same role checks before displaying sensitive information.

Generated by OpenCVE AI on April 22, 2026 at 15:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpdevelop
Wpdevelop booking Calendar
Vendors & Products Wordpress
Wordpress wordpress
Wpdevelop
Wpdevelop booking Calendar
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Booking Calendar plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Exposure in all versions up to, and including, 10.14.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view all booking records in the database, including personally identifiable information (PII) such as names, email addresses, phone numbers, physical addresses, payment status, booking costs, and booking hashes belonging to other users.
Title Booking Calendar <= 10.14.11 - Missing Authorization to Sensitive Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
Wpdevelop Booking Calendar
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:05.571Z

Reserved: 2025-12-19T16:56:52.018Z

Link: CVE-2025-14982

cve-icon Vulnrichment

Updated: 2026-01-16T14:03:15.307Z

cve-icon NVD

Status : Deferred

Published: 2026-01-16T05:16:12.483

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:45:20Z

Weaknesses