Impact
The Five Star Restaurant Reservations WordPress plugin contains an improper equality check that allows an attacker to bypass payment verification. The plugin’s valid_payment() function compares a user-supplied payment_id against a booking’s stripe_payment_intent_id using PHP loose comparison (==). When the booking has no payment intent yet, the comparison of an empty string to null evaluates to true, causing the plugin to believe the payment succeeded even though no Stripe transaction occurred. This flaw enables unauthenticated users to mark any pending booking as paid without completing a legitimate Stripe payment, increasing risk of financial loss or unauthorized reservations.
Affected Systems
This vulnerability affects the rustaurius Five Star Restaurant Reservations plugin for WordPress, specifically versions 2.7.16 and earlier. Any site using these versions of the plugin is at risk unless a newer version is deployed.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score is not available. Because the flaw is exploitable via an unauthenticated HTTP request to the rtb_stripe_pmt_succeed AJAX endpoint, the attack surface is broad. The vulnerability is not listed in the CISA KEV catalog, but its moderate risk and broad exposure suggest that organizations should prioritize remediation promptly.
OpenCVE Enrichment