Description
Insertion of Sensitive Information Into Sent Data vulnerability in e4jvikwp VikBooking Hotel Booking Engine & PMS vikbooking allows Retrieve Embedded Sensitive Data.This issue affects VikBooking Hotel Booking Engine & PMS: from n/a through <= 1.8.2.
Published: 2025-12-18
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vendor plugin VikBooking Hotel Booking Engine & PMS contains an insertion flaw that allows sensitive information to be embedded into outgoing data streams. This flaw is classified as a Sensitive Information Exposure weakness and is catalogued as CWE-201. An attacker can obtain confidential data by exploiting the plugin's data handling routines, potentially revealing customer personal details or payment information.

Affected Systems

This vulnerability affects the WordPress plugin noted as e4jvikwp:VikBooking Hotel Booking Engine & PMS. The issue is present in all versions from the initial release up to and including 1.8.2. No other product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.9 suggests a moderate severity risk. The EPSS score of less than 1% indicates that the probability of exploitation is currently very low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to involve access to the plugin’s administrative interface or to the data exposed through the web application, although the description does not explicitly state the vector. In practice, an attacker would need some level of user interaction or a compromising environment to trigger the data leakage. Because the exploitation pathway is not fully described, a defensive posture remains prudent but the risk of an undetected incident is considered limited at present.

Generated by OpenCVE AI on April 30, 2026 at 14:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade VikBooking to a version newer than 1.8.2 if a patch is available from the vendor.
  • If an upgrade is not possible, consider disabling or uninstalling the vulnerable plugin.
  • Restrict log file access to prevent accidental exposure of sensitive data in server logs.
  • Monitor web application traffic for requests that contain unusually detailed or personal information to detect potential data exposure.

Generated by OpenCVE AI on April 30, 2026 at 14:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Vikwp
Vikwp vikbooking Hotel Booking Engine & Pms
Wordpress
Wordpress wordpress
Vendors & Products Vikwp
Vikwp vikbooking Hotel Booking Engine & Pms
Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in e4jvikwp VikBooking Hotel Booking Engine & PMS vikbooking allows Retrieve Embedded Sensitive Data.This issue affects VikBooking Hotel Booking Engine & PMS: from n/a through <= 1.8.2.
Title WordPress VikBooking Hotel Booking Engine & PMS plugin <= 1.8.2 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References

Subscriptions

Vikwp Vikbooking Hotel Booking Engine & Pms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:07.897Z

Reserved: 2025-06-11T16:06:59.982Z

Link: CVE-2025-49918

cve-icon Vulnrichment

Updated: 2025-12-18T19:34:02.883Z

cve-icon NVD

Status : Deferred

Published: 2025-12-18T08:15:52.083

Modified: 2026-04-27T20:16:17.043

Link: CVE-2025-49918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:45:24Z

Weaknesses