WP Booking System – Booking Calendar Vulnerability (Medium) – CVE-2…

WP Booking System – Booking Calendar Vulnerability (Medium) – CVE-2…

by | Mar 12, 2026 | Plugins

Attack Vectors

CVE-2025-68515 is a Medium-severity vulnerability (CVSS 5.3) affecting WP Booking System – Booking Calendar (plugin slug: wp-booking-system) in versions up to and including 2.0.19.12. It is categorized as an Unauthenticated Information Exposure issue.

Because no login is required (PR:N), an external attacker can attempt to access exposed data directly over the internet (AV:N) with relatively low effort (AC:L). This increases risk for any site that uses the plugin for booking or scheduling workflows, especially if the site is publicly accessible (as most marketing and booking sites are).

Reference: CVE-2025-68515. Vendor/community tracking: Wordfence advisory.

Security Weakness

The underlying weakness is that the plugin can expose sensitive user or configuration data to unauthenticated requests in affected versions. In business terms, this is a breakdown in access control and data handling that should normally limit what anonymous visitors (and bots) can retrieve.

Even when the exposed information is “only” partial (for example, fragments of configuration or user-related details), it can still be valuable to attackers for reconnaissance, targeted phishing, account takeover attempts, or follow-on attacks against your WordPress environment.

Remediation: Update WP Booking System – Booking Calendar to version 2.0.19.13 or newer (patched) as recommended by the published advisory.

Technical or Business Impacts

Customer trust and brand risk: Booking and scheduling touchpoints often sit close to high-intent customers. Any leak involving user-related information can quickly become a reputational issue, particularly for consumer brands, hospitality, healthcare-adjacent services, and local businesses.

Compliance exposure: If the exposed information includes personal data (or can be correlated to identify individuals), you may face privacy and reporting obligations depending on your industry and jurisdiction. This is especially relevant for organizations with an active Compliance function and regulated handling of customer data.

Increased likelihood of follow-on incidents: Information exposure frequently serves as a stepping stone. Attackers can use discovered details to identify other plugins, settings, or operational patterns, reducing the time and cost to execute broader attacks (including credential stuffing and social engineering against staff).

Operational impact: Even without direct service disruption (the CVSS vector indicates no integrity or availability impact), responding to a suspected data exposure can still require time-consuming investigation, stakeholder communication, and potential customer outreach—costs that matter to CEOs, CFOs, and COOs.

Similar Attacks

Information disclosure and data exposure issues have affected WordPress components before, often creating reputational and compliance pressure even when the technical severity is not “critical.” Examples include:

CVE-2018-19207 (WP GDPR Compliance) – a WordPress plugin vulnerability that enabled unauthorized actions and raised concerns around exposure of user-related data.

CVE-2020-24186 (wpDiscuz) – a widely reported issue involving SQL injection risk that could be used to access data stored in the site’s database.

CVE-2017-1001000 (WordPress REST API content injection) – a major WordPress-core issue that demonstrated how publicly reachable endpoints can be abused when access controls or validation are insufficient.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers