Description
Missing Authorization vulnerability in Alejandro Quick Restaurant Reservations quick-restaurant-reservations allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Quick Restaurant Reservations: from n/a through <= 1.6.7.
Published: 2026-01-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

The vulnerability is a broken access control flaw that allows an attacker to bypass authorization checks and execute privileged actions within the Quick Restaurant Reservations plugin. This flaw maps to CWE‑862, indicating that users can perform operations they should not be permitted to perform. The impact is the potential for unauthorized creation, modification, or deletion of reservations, and possibly access to sensitive reservation data.

Affected Systems

The affected product is the Quick Restaurant Reservations plugin by Alejandro, version 1.6.7 and all earlier releases. No other versions are known to be vulnerable.

Risk and Exploitability

The CVSS score of 5.3 reflects medium severity, and the EPSS score of less than 1% indicates a low probability of exploitation under current conditions; the vulnerability is not listed in the CISA KEV catalog. Based on the description, the most likely attack vector involves interacting with the plugin’s administrative or front‑end interfaces, where incorrect security level configuration can be leveraged by authenticated or unauthenticated users with sufficient access. No public exploit code is known, but the weakness could be combined with other attacks to facilitate broader compromise.

Generated by OpenCVE AI on April 16, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Quick Restaurant Reservations plugin to a version newer than 1.6.7.
  • If upgrading is not immediately possible, limit or remove user capabilities that allow access to the plugin’s administrative endpoints to prevent unauthorized use.
  • If the reservation functionality is not essential, disable or uninstall the plugin entirely to eliminate the attack surface.

Generated by OpenCVE AI on April 16, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Alejandro
Alejandro quick Restaurant Reservations
Wordpress
Wordpress wordpress
Vendors & Products Alejandro
Alejandro quick Restaurant Reservations
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Alejandro Quick Restaurant Reservations quick-restaurant-reservations allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Quick Restaurant Reservations: from n/a through <= 1.6.7.
Title WordPress Quick Restaurant Reservations plugin <= 1.6.7 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Alejandro Quick Restaurant Reservations
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:13.904Z

Reserved: 2026-01-23T12:31:31.583Z

Link: CVE-2026-24529

cve-icon Vulnrichment

Updated: 2026-01-26T19:09:23.075Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:08.797

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24529

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:00:12Z

Weaknesses