Impact
The vulnerability stems from a missing authorization check in the WordPress WP Time Slots Booking Form plugin. Because the plugin’s access control levels are incorrectly configured, an attacker can reach protected booking functions that should only be available to authenticated users. This flaw allows unauthorized creation, modification, or deletion of booking entries, potentially corrupting event schedules and exposing sensitive information. This flaw is a CWE‑862 (Missing Authorization) vulnerability.
Affected Systems
All releases of the WordPress WP Time Slots Booking Form plugin from codepeople up to and including version 1.2.39 are affected. This issue is present in every earlier version since the product’s initial release. Users running any of these versions should assume the vulnerability exists.
Risk and Exploitability
The CVSS base score of 6.5 signals moderate severity. The EPSS value of less than 1% indicates a low probability that this flaw will be exploited in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to send requests to the plugin’s booking endpoints, which are publicly accessible on the WordPress site. While the risk of exploitation is not high, the impact on data integrity justifies prompt remediation.
OpenCVE Enrichment