Appointment Booking Calendar Plugin – Bookr Vulnerability (Medium) …

Appointment Booking Calendar Plugin – Bookr Vulnerability (Medium) …

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-1932 (Medium severity, CVSS 5.3) affects the WordPress plugin Appointment Booking Calendar Plugin – Bookr (slug: bookr) in versions 1.0.2 and earlier. The issue involves the plugin’s REST API endpoint used to update appointment records.

Because the endpoint is missing an authorization check, an unauthenticated attacker can potentially send requests over the internet to change the status of appointments. This can be performed remotely, without needing a user account, and without relying on a victim to click a link or take an action.

Security Weakness

The core weakness is a missing capability (permission) check on the plugin’s update-appointment REST API endpoint. In plain terms: the software does not consistently verify that the person making the request is allowed to update appointment data.

Wordfence reports that this affects all versions up to and including 1.0.2, and that the result is unauthorized data modification—specifically, changing the status of any appointment.

Technical or Business Impacts

For marketing leaders and business owners, the risk is less about “hacking servers” and more about trust, operational integrity, and revenue impact. If appointment statuses can be changed by unknown parties, it can create confusion in scheduling workflows and undermine the customer experience.

Potential impacts include missed or improperly confirmed appointments, operational disruption for sales and service teams, and avoidable revenue loss from no-shows or scheduling errors. It may also increase support burden as staff reconcile discrepancies and customers question reliability.

From a compliance and audit perspective, unauthorized changes to business records can complicate record integrity and internal controls, especially in regulated environments where appointment history and customer interactions may be considered business evidence.

Remediation note: There is no known patch available per the advisory source. Organizations should evaluate mitigations based on risk tolerance; it may be appropriate to uninstall Appointment Booking Calendar Plugin – Bookr (bookr) and replace it with an alternative that has an active security maintenance track record.

Similar Attacks

Authorization gaps and exposed endpoints have been repeatedly used to manipulate business workflows and site content across different platforms and plugins. Real-world examples include:

Drizly security failures leading to a data breach (FTC) — an example of how security control weaknesses can translate into regulatory and reputational consequences.

Equifax breach advisory (CISA) — a high-profile case showing how preventable weaknesses can escalate into major business risk.

Microsoft Exchange Server vulnerabilities advisory (CISA) — illustrates how exposed services can be abused at scale when access control and patching are not sufficient.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers