Description
Missing Authorization vulnerability in Syntactics, Inc. eaSYNC easync-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects eaSYNC: from n/a through <= 1.3.19.
Published: 2025-04-04
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authorization flaw in the Syntactics, Inc. eaSYNC booking plugin allows an attacker to perform actions normally restricted to privileged users. This weakness can lead to unauthorized viewing or manipulation of booking data and configuration settings, exposing sensitive information and potentially enabling further attacks.

Affected Systems

The vulnerability applies to the WordPress eaSYNC booking plugin for all versions up to and including 1.3.19. Users running any of those releases are at risk.

Risk and Exploitability

The CVSS score of 5.4 indicates medium severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the general population. The issue is not listed in the CISA KEV catalog. Based on the description, the most probable attack vector is via web requests to the plugin’s exposed endpoints, which an unauthenticated or low‑privilege user could exploit if anonymity is sufficient to reach those URLs.

Generated by OpenCVE AI on May 1, 2026 at 00:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update eaSYNC to a version newer than 1.3.19.
  • If an update is not immediately possible, restrict or remove access to eaSYNC endpoints for non‑admin roles.
  • Apply role‑based access controls on the WordPress site to ensure that only authorized users can interact with eaSYNC functionality.

Generated by OpenCVE AI on May 1, 2026 at 00:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9818 Missing Authorization vulnerability in Syntactics, Inc. eaSYNC allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects eaSYNC: from n/a through 1.3.19.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Syntactics, Inc. eaSYNC allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects eaSYNC: from n/a through 1.3.19. Missing Authorization vulnerability in Syntactics, Inc. eaSYNC easync-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects eaSYNC: from n/a through <= 1.3.19.
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Fri, 04 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Syntactics, Inc. eaSYNC allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects eaSYNC: from n/a through 1.3.19.
Title WordPress eaSYNC plugin <= 1.3.19 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:19.212Z

Reserved: 2025-04-04T10:01:42.464Z

Link: CVE-2025-32219

cve-icon Vulnrichment

Updated: 2025-04-04T19:52:47.368Z

cve-icon NVD

Status : Deferred

Published: 2025-04-04T16:15:31.200

Modified: 2026-04-23T15:28:46.757

Link: CVE-2025-32219

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:30:04Z

Weaknesses