Description
Missing Authorization vulnerability in codepeople Appointment Booking Calendar appointment-booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Appointment Booking Calendar: from n/a through <= 1.3.95.
Published: 2025-11-13
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability stems from a missing authorization check in the codepeople Appointment Booking Calendar plugin for WordPress. The plugin fails to enforce proper access controls, allowing an attacker to read, modify, or delete appointment data that should be restricted to privileged users. Because the weakness directly compromises confidentiality and integrity of booking information, an adversary could disrupt scheduling workflows or harvest sensitive user details.

Affected Systems

All WordPress sites that have installed codepeople Appointment Booking Calendar version 1.3.95 or earlier are affected. The flaw is present across every release up through 1.3.95, so any site running the plugin without updating is vulnerable. The issue is tied to the plugin’s internal booking management interfaces and is unknown in later versions.

Risk and Exploitability

The recorded CVSS score of 5.4 reflects moderate severity, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, further suggesting limited public exploitation. The likely attack vector is through HTTP/HTTPS traffic to the plugin’s booking‑management endpoints; based on the description, it is inferred that an attacker can trigger the missing access controls remotely by constructing requests to the affected URLs.

Generated by OpenCVE AI on April 29, 2026 at 23:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Appointment Booking Calendar plugin to the latest fixed release, version 1.3.96 or newer.
  • If an update cannot be applied immediately, restrict access to the booking management pages by assigning only trusted administrator roles in WordPress, ensuring that edit rights are not granted to lower‑privilege users.
  • Audit and disable any custom code or additional plugins that interact with the booking calendar’s API endpoints to eliminate unauthorized exposure of management functions.

Generated by OpenCVE AI on April 29, 2026 at 23:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Codepeople
Codepeople appointment Booking Calendar
Wordpress
Wordpress wordpress
Vendors & Products Codepeople
Codepeople appointment Booking Calendar
Wordpress
Wordpress wordpress

Thu, 13 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in codepeople Appointment Booking Calendar appointment-booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Appointment Booking Calendar: from n/a through <= 1.3.95.
Title WordPress Appointment Booking Calendar plugin <= 1.3.95 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Codepeople Appointment Booking Calendar
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:12.817Z

Reserved: 2025-10-29T03:08:22.608Z

Link: CVE-2025-64261

cve-icon Vulnrichment

Updated: 2025-11-13T17:48:22.598Z

cve-icon NVD

Status : Deferred

Published: 2025-11-13T10:15:51.310

Modified: 2026-04-27T16:16:38.520

Link: CVE-2025-64261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:15:23Z

Weaknesses