Back to Advanced Plugins

WPBookit

wpbookit
10
Total Installs
10
Total Vulnerabilities
5
Critical
2
High
3
Medium
0
Low

Vulnerabilities (10)

WPBookit <= 1.0.7 - Cross-Site Request Forgery to Customer Deletion
medium Unpatched
CVSS Score 4.3
CWE CWE-352: Cross-Site Request Forgery (CSRF)
Published Dec 12, 2025
The WPBookit plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the 'delete_customer' route. This makes it possible for unauthenticated attackers to delete customers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
WPBookit <= 1.0.6 - Unauthenticated Stored Cross-Site Scripting
high Patched
CVSS Score 7.2
CWE CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Published Nov 20, 2025
The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'css_code' parameter in all versions up to, and including, 1.0.6 due to a missing capability check on the save_custome_code() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WPBookit <= 1.0.6 - Unauthenticated Arbitrary File Upload via image_upload_handle Function
critical Patched
CVE ID CVE-2025-7852
CVSS Score 9.8
CWE CWE-434: Unrestricted Upload of File with Dangerous Type
Published Jul 23, 2025
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_new_customer' route in all versions up to, and including, 1.0.6. The plugin’s image‐upload handler calls move_uploaded_file() on client‐supplied files without restricting allowed extensions or MIME types, nor sanitizing the filename. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
WPBookit <= 1.0.4 - Authenticated (Subscriber+) Arbitrary File Upload
high Patched
CVE ID CVE-2025-6057
CVSS Score 8.8
CWE CWE-434: Unrestricted Upload of File with Dangerous Type
Published Jul 11, 2025
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_image_upload() function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
critical Patched
CVE ID CVE-2025-6058
CVSS Score 9.8
CWE CWE-434: Unrestricted Upload of File with Dangerous Type
Published Jul 11, 2025
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
WPBookit <= 1.0.2 - Insecure Direct Object Reference to Unauthenticated Privilege Escalation via Email Update
critical Patched
CVE ID CVE-2025-3811
CVSS Score 9.8
CWE CWE-639: Authorization Bypass Through User-Controlled Key
Published May 8, 2025
The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email through the edit_newdata_customer_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
WPBookit <= 1.0.2 - Insecure Direct Object Reference to Unauthenticated Privilege Escalation via Account Takeover
critical Patched
CVE ID CVE-2025-3810
CVSS Score 9.8
CWE CWE-639: Authorization Bypass Through User-Controlled Key
Published May 8, 2025
The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account.
WPBookit <= 1.0.7 - Missing Authorization
medium Patched
CVSS Score 5.3
CWE CWE-862: Missing Authorization
Published Apr 4, 2025
The WPBookit plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.0.7. This makes it possible for unauthenticated attackers to perform an unauthorized action.
WPBookit <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
medium Patched
CVSS Score 6.1
CWE CWE-352: Cross-Site Request Forgery (CSRF)
Published Mar 9, 2025
The WPBookit plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
WPBookit <= 1.6.9 - Unauthenticated Arbitrary File Upload
critical Patched
CVE ID CVE-2025-0357
CVSS Score 9.8
CWE CWE-434: Unrestricted Upload of File with Dangerous Type
Published Jan 24, 2025
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.