Description
Missing Authorization vulnerability in Magepeople inc. WpBookingly allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects WpBookingly: from n/a through 1.2.9.
Published: 2026-05-20
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authorization check in the WordPress WpBookingly plugin allows an attacker to perform actions that should be restricted to privileged users. The vulnerability enables incorrect access to plugin functionality, potentially exposing data or allowing unauthorized modification of booking or service information. The weakness is classified as CWE‑862 (Missing Authorization).

Affected Systems

The flaw affects installations of the Magepeople inc. WpBookingly plugin up to version 1.2.9 on WordPress sites. Any site running a vulnerable plugin version is susceptible, regardless of the WordPress core version. The impact could span single deployments to large multi‑site WordPress installations that rely on this booking manager.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, implying no known public exploits at the time of assessment. The attack vector is likely remote via the web interface of the plugin, allowing an attacker who can reach the plugin’s endpoints to trigger the broken access controls without needing special privileges. The risk is amplified on sites where the plugin’s administrative pages are open to unauthenticated or low‑privilege users.

Generated by OpenCVE AI on May 20, 2026 at 14:39 UTC.

Remediation

Vendor Solution

Update the WordPress WpBookingly Plugin to the latest available version (at least 1.3.0).


OpenCVE Recommended Actions

  • Update the WpBookingly plugin to version 1.3.0 or later.
  • If the plugin is not essential to your site’s functionality, consider disabling or uninstalling it to remove the exposure.
  • Restrict access to the plugin’s privileged actions by applying strict role‑based permissions, ensuring only authorized administrators can perform sensitive operations.

Generated by OpenCVE AI on May 20, 2026 at 14:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 13:15:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Magepeople inc. WpBookingly allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpBookingly: from n/a through 1.2.9.
Title WordPress WpBookingly plugin <= 1.2.9 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-20T14:18:21.835Z

Reserved: 2026-02-19T09:52:08.215Z

Link: CVE-2026-27405

cve-icon Vulnrichment

Updated: 2026-05-20T14:18:13.597Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T13:16:16.750

Modified: 2026-05-20T13:54:54.890

Link: CVE-2026-27405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T14:45:32Z

Weaknesses