Description
The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to query sensitive data.
Published: 2026-03-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data exposure via missing authentication
Action: Immediate Patch
AI Analysis

Impact

The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress has a missing capability check on multiple REST API endpoints in all versions up to 1.0.16, which allows an unauthenticated attacker to query sensitive data. This results in a confidentiality breach, potentially exposing customer information, appointments, orders, and team member details. The vulnerability corresponds to CWE-306, indicating a lack of proper authorization checks.

Affected Systems

All published releases of the Booktics plugin for WordPress, from the initial release through version 1.0.16, are affected. The issue resides in various REST API controllers such as appointment, customer, order, and team member endpoints.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers can reach the affected endpoints over the network and perform unauthenticated GET requests, without needing elevated privileges or additional credentials. The lack of an authentication guard makes exploitation straightforward, but its visibility and impact remain limited to data confidentiality.

Generated by OpenCVE AI on April 15, 2026 at 16:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Booktics plugin to the latest available release, which includes the necessary capability checks to protect sensitive data.
  • If an immediate upgrade is not feasible, restrict access to the affected REST API endpoints by implementing server‑side access controls (e.g., using .htaccess, firewall rules, or API authentication mechanisms) so only authenticated users can call them.
  • Consider applying the patch referenced in the plugin source code directly, or enable a security plugin that blocks unauthenticated REST access to WordPress endpoints.

Generated by OpenCVE AI on April 15, 2026 at 16:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Arraytics
Arraytics booktics – Booking Calendar For Appointments And Service Businesses
Wordpress
Wordpress wordpress
Vendors & Products Arraytics
Arraytics booktics – Booking Calendar For Appointments And Service Businesses
Wordpress
Wordpress wordpress

Tue, 10 Mar 2026 02:45:00 +0000

Type Values Removed Values Added
Description The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to query sensitive data.
Title Booktics <= 1.0.16 - Missing Authorization to Get Items via REST API endpoints
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Arraytics Booktics – Booking Calendar For Appointments And Service Businesses
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:36.464Z

Reserved: 2026-02-04T16:38:59.005Z

Link: CVE-2026-1919

cve-icon Vulnrichment

Updated: 2026-03-10T15:58:08.298Z

cve-icon NVD

Status : Deferred

Published: 2026-03-10T17:32:45.850

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-1919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses