Description
Missing Authorization vulnerability in igms iGMS Direct Booking igms-direct-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iGMS Direct Booking: from n/a through <= 1.3.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Patch
AI Analysis

Impact

The iGMS Direct Booking plugin for WordPress includes a missing authorization flaw that allows users to bypass the intended access controls. Because the vulnerability falls under CWE-862, it enables an attacker to read and potentially modify booking records that should be restricted. The impact is a direct compromise of the confidentiality and integrity of reservation data on affected sites.

Affected Systems

WordPress sites that have installed any version of the iGMS Direct Booking plugin up to and including version 1.3 are affected. Site owners should verify the plugin version in the WordPress dashboard and take action if the installed release is 1.3 or older.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact, while an EPSS rating of less than 1 % suggests that exploitation is unlikely to occur frequently. The vulnerability is not listed in the CISA KEV catalog, further reducing the likelihood of widespread attacks. Based on the description, it is inferred that an attacker would need to target plugin endpoints that are meant to be restricted but lack proper role checks. If successful, the actor could use those points to gain unauthorized read or write access to booking information.

Generated by OpenCVE AI on April 9, 2026 at 18:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update iGMS Direct Booking to the latest release or remove the plugin if no longer needed.
  • Re‑enable the default WordPress permission checks for the plugin by ensuring that only users with the appropriate roles can access booking functions.
  • Restrict the plugin’s administrative pages to trusted IP addresses or employ a web application firewall to block suspicious traffic.
  • Monitor site logs for anomalous access or changes to booking data and investigate promptly if such events are detected.

Generated by OpenCVE AI on April 9, 2026 at 18:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Igms
Igms igms Direct Booking
Wordpress
Wordpress wordpress
Vendors & Products Igms
Igms igms Direct Booking
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in igms iGMS Direct Booking igms-direct-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iGMS Direct Booking: from n/a through <= 1.3.
Title WordPress iGMS Direct Booking plugin <= 1.3 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Igms Igms Direct Booking
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-09T15:19:38.467Z

Reserved: 2026-04-07T10:57:48.107Z

Link: CVE-2026-39652

cve-icon Vulnrichment

Updated: 2026-04-09T15:18:38.452Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:36.327

Modified: 2026-04-24T18:06:24.707

Link: CVE-2026-39652

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:40:42Z

Weaknesses