Booking Calendar Vulnerability (Medium) – CVE-2026-1431

Booking Calendar Vulnerability (Medium) – CVE-2026-1431

by | Jan 30, 2026 | Plugins

Attack Vectors

The WordPress Booking Calendar plugin (slug: booking) is affected by a Medium severity vulnerability (CVSS 5.3) that can be exploited over the internet without requiring a login. In practical terms, an unauthenticated attacker can target the plugin’s AJAX functionality to request booking details that should not be accessible publicly.

Because no special permissions are required (no account and no user interaction), this exposure is especially relevant for businesses that rely on online booking and publish a booking interface to the public.

Security Weakness

This issue is a missing authorization (missing capability check) in the plugin’s wpbc_ajax_WPBC_FLEXTIMELINE_NAV() function, affecting all versions up to and including Booking Calendar 10.14.13. The weakness allows unauthorized access to booking data that should be restricted.

According to the published advisory, the exposed information may include customer names, phone numbers, and email addresses. The vulnerability is tracked as CVE-2026-1431.

Technical or Business Impacts

The primary risk is data exposure of customer booking information. For marketing leaders and executives, this can translate into reputational harm, loss of customer trust, and increased scrutiny from customers and partners—especially if your booking process is a key part of lead generation or customer experience.

From a compliance and governance standpoint, exposure of names, emails, and phone numbers can trigger privacy and regulatory obligations depending on your jurisdiction and contracts. Even when the CVSS score is moderate, the business impact can be significant because the access is unauthenticated and the data is personally identifiable.

Remediation: Update Booking Calendar to 10.14.14 or any newer patched version as soon as possible, prioritizing sites that accept bookings publicly.

Similar Attacks

Unauthorized access and exposure of customer or operational data is a common theme in WordPress plugin incidents, particularly when authorization checks are missing from public endpoints. Real-world examples that highlight the business consequences of security gaps include:

Equifax (2017) data breach and regulatory settlement — a major example of how security failures can lead to large-scale exposure, reputational damage, and long-term compliance costs.

FBI PSA on data extortion — illustrates how exposed or stolen data is commonly leveraged for extortion, putting additional financial and brand pressure on organizations.

OWASP Top 10 (Broken Access Control) — while not a single incident, it documents a widely observed class of real-world attacks where missing authorization enables unauthorized data access, similar in pattern to this Booking Calendar issue.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers