Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Case-Themes Booked booked allows Authentication Abuse.This issue affects Booked: from n/a through <= 3.0.0.
Published: 2026-02-20
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an Authentication Bypass Using an Alternate Path or Channel flaw that allows an attacker to abuse authentication and potentially assume legitimate user accounts. The issue is tied to the common weakness category of Authentication and is identified as CWE-288. The effect is that without proper authentication checks, an attacker could potentially take over user accounts and access any functionality available to that role, thereby compromising confidentiality and integrity of the website data. The description explicitly states that the bug enables authentication abuse, and because the flaw remains present until version 3.0.0, any site running an affected build is exposed to this risk.

Affected Systems

The affected system is the WordPress Booked plugin developed by Case‑Themes, specifically any installation of the plugin at version 3.0.0 or earlier. All WordPress sites that include this plugin version are subject to the flaw until a newer version is installed. No other products or versions are mentioned in the data.

Risk and Exploitability

The CVSS score of 6.7 places the vulnerability in the moderate severity range, while the EPSS score of less than 1% indicates a very low but non‑zero probability that the flaw is actively exploited in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no widespread exploitation has been observed. The likely attack vector is an alternate or hidden URL path that bypasses the normal authentication flow, allowing an attacker to assume a user’s identity. Successful exploitation would require only knowledge of a valid user account, so the scope is broadly limited to the site’s user base and the level of privileges granted. The risk is therefore primarily to confidentiality and potential control over the site’s administrative functions.

Generated by OpenCVE AI on April 28, 2026 at 17:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Case‑Themes Booked plugin to any release newer than 3.0.0 to remove the authentication bypass bug.
  • Enforce strong password policies and enable multi‑factor authentication for all site users to protect against account compromise even if the flaw is somehow leveraged.
  • Disable or restrict direct URL access to administrative or user‑editable endpoints that are known to be exposed by the plugin; implement proper access controls so only authorized roles can reach those paths.

Generated by OpenCVE AI on April 28, 2026 at 17:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H'}


Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Case-themes
Case-themes booked
Wordpress
Wordpress wordpress
Vendors & Products Case-themes
Case-themes booked
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Case-Themes Booked booked allows Authentication Abuse.This issue affects Booked: from n/a through <= 3.0.0.
Title WordPress Booked plugin <= 3.0.0 - Account Takeover vulnerability
Weaknesses CWE-288
References

Subscriptions

Case-themes Booked
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:46:46.228Z

Reserved: 2026-01-07T12:21:11.736Z

Link: CVE-2026-22341

cve-icon Vulnrichment

Updated: 2026-02-24T19:54:29.272Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:32.630

Modified: 2026-04-28T19:36:29.987

Link: CVE-2026-22341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T17:45:16Z

Weaknesses