WP Hotel Booking Vulnerability (Medium) – CVE-2025-63012

WP Hotel Booking Vulnerability (Medium) – CVE-2025-63012

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2025-63012 is a medium-severity Cross-Site Request Forgery (CSRF) issue in the WP Hotel Booking plugin (slug: wp-hotel-booking) affecting versions up to and including 2.2.8. CSRF attacks don’t require the attacker to log in; instead, they rely on getting a trusted user—typically a WordPress administrator—to unknowingly trigger a malicious request.

In practice, an attacker may send an email, direct message, or place a link/button on a webpage that looks legitimate. If an admin is already logged into WordPress and clicks the link (or sometimes loads a page that triggers a request), the site may process the action as if the admin intentionally performed it. The CVSS vector reflects this “human interaction required” factor (UI:R) and a network-deliverable scenario (AV:N), resulting in a CVSS 4.3 rating.

Security Weakness

The root cause is missing or incorrect nonce validation on a function within WP Hotel Booking. In WordPress, a nonce is a common safeguard that helps confirm a request came from a legitimate source and was intentionally initiated by an authorized user. When nonce validation is absent or implemented incorrectly, forged requests can slip through.

Because this weakness is tied to request validation—not credential theft—traditional security measures like strong passwords may not prevent the attack if an authenticated admin can be induced to interact with a crafted link or page.

Technical or Business Impacts

The impact described for CVE-2025-63012 is consistent with unauthorized actions being performed under an administrator’s session. While the CVSS indicates low integrity impact (I:L) and no direct confidentiality or availability impact (C:N/A:N), the business risk can still be meaningful for hospitality brands that depend on a reliable booking experience and accurate site configuration.

From a business perspective, even limited unauthorized changes can create downstream issues: marketing campaigns may point to altered booking flows, site settings may shift without clear attribution, and teams can lose time investigating “mysterious” changes. This can translate into wasted ad spend, reduced conversion rates, brand friction, and avoidable operational overhead—especially during peak booking seasons.

Recommended remediation: Update WP Hotel Booking to version 2.2.9 or a newer patched version. For reference, see the CVE record at https://www.cve.org/CVERecord?id=CVE-2025-63012 and the source advisory at Wordfence Threat Intel.

Similar Attacks

CSRF is a common web application risk pattern, and it has affected many popular platforms and plugins over the years. Here are a few real examples of CSRF-related vulnerabilities documented publicly:

CVE-2018-20148 (Jenkins)
CVE-2016-1000145 (WordPress plugin CSRF example)
CVE-2019-9978 (WordPress plugin-related web vulnerability record)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers