Bookster – WordPress Appointment Booking Plugin Vulnerability (Medi…

Bookster – WordPress Appointment Booking Plugin Vulnerability (Medi…

by | Feb 18, 2026 | Plugins

Attack Vectors

Bookster – WordPress Appointment Booking Plugin (slug: bookster) has a Medium severity vulnerability (CVSS 4.9) tracked as CVE-2025-8781. The issue is an authenticated SQL Injection that requires Administrator-level access (or higher), meaning the attacker must already be logged into WordPress with elevated privileges.

According to the published advisory, the attack is performed by supplying a crafted value to the “raw” parameter. Because the vulnerable versions (up to and including 2.1.1) do not sufficiently escape and prepare this input, an attacker with admin access can append additional SQL to an existing database query.

Security Weakness

The core weakness is insufficient escaping of a user-supplied parameter combined with a lack of adequate query preparation in the plugin’s database interaction. In practical terms, this is a failure to robustly separate user input from database commands.

While the prerequisite of Administrator privileges reduces broad internet exposure, it increases the importance of internal controls: if an admin account is compromised (phishing, credential reuse, shared accounts, or third-party access), the attacker can use this vulnerability to access sensitive database contents.

Technical or Business Impacts

The advisory notes the vulnerability can be used to extract sensitive information from the database (CVSS indicates High confidentiality impact, with no stated integrity or availability impact). For marketing directors and executives, this maps to clear business risk: customer and appointment-related data exposure can trigger brand damage, customer churn, and loss of trust—especially if scheduling or contact data is involved in lead generation and retention.

For compliance teams, data exposure risk can translate into notification obligations, increased scrutiny from regulators or auditors, and potential contractual issues with partners. Even when the vulnerability requires admin access, organizations often have multiple admins, vendors, or agencies with elevated permissions—expanding the number of potential pathways to exploitation.

Remediation

Update Bookster – WordPress Appointment Booking Plugin to version 2.2.0 or newer, which is the vendor-recommended fix for the vulnerability affecting versions up to 2.1.1.

In parallel, reduce operational risk by reviewing who has Administrator access, removing unnecessary admin accounts, and ensuring strong authentication practices for privileged users. This helps limit exposure from compromised credentials or third-party access—common precursors to attacks that leverage admin-only vulnerabilities.

Similar Attacks

SQL injection is a long-running class of vulnerability with real-world impact. Public examples include the OWASP SQL Injection overview, which documents common business impacts and patterns.

For widely reported incidents tied to injection-style flaws, see the 2017 Equifax breach details from the U.S. House Oversight Committee report and the UK ICO’s case summary of the British Airways incident involving web application compromise at scale: ICO enforcement notice and summary.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers