Impact
The vulnerability allows an unauthenticated attacker to supply a negative number to the 'tips' parameter in the booking process. The plugin trusts this input without server‑side validation, causing the calculated total price to be reduced to zero. As a result, users can book appointments without paying, directly eroding the site owner's revenue.
Affected Systems
WordPress installations that use the Bookly scheduling plugin version 27.0 or earlier are affected. The vulnerability exists in the core booking module of the plugin and is not limited to a specific WordPress theme or custom code.
Risk and Exploitability
The severity is rated moderate with a CVSS score of 5.3. No exploit probability data is available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can trigger it via an unauthenticated HTTP request to the booking endpoint, and no authentication or advanced privileges are required. The impact is primarily financial loss rather than system compromise.
OpenCVE Enrichment