CVE-2022-0920

7.5 HIGH

📋 TL;DR

The Salon booking system WordPress plugins (Free and Pro) before version 7.6.3 have improper authorization in some API endpoints. This allows customers to access all bookings and other customers' personal data. WordPress sites using these vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Salon booking system Free WordPress plugin
  • Salon booking system Pro WordPress plugin
Versions: All versions before 7.6.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could exfiltrate all customer data including names, contact details, booking history, and potentially payment information, leading to data breach, privacy violations, and regulatory fines.

🟠

Likely Case

Malicious customers or attackers with customer accounts could view other customers' bookings and personal information, compromising privacy and potentially enabling social engineering attacks.

🟢

If Mitigated

With proper authorization controls, customers can only access their own data, maintaining privacy and data segregation as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a customer account but involves simple API calls to unauthorized endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.3

Vendor Advisory: https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Salon booking system' plugin. 4. Click 'Update Now' if available, or download version 7.6.3+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable endpoints via .htaccess

all

Restrict access to specific plugin API endpoints until patching

# Add to .htaccess in WordPress root directory
<FilesMatch "(booking|api)\.php$">
    Order Deny,Allow
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Disable the Salon booking system plugin entirely until patching is possible
  • Implement web application firewall rules to block suspicious API requests to booking endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Salon booking system version. If version is below 7.6.3, it's vulnerable.

Check Version:

wp plugin list --name="salon booking system" --field=version

Verify Fix Applied:

After updating, verify plugin version shows 7.6.3 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests to /wp-json/salon/v1/ endpoints from customer accounts
  • Multiple failed authorization attempts on booking endpoints

Network Indicators:

  • HTTP requests to booking API endpoints with different user IDs than the authenticated user

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/salon/v1/bookings" OR uri_path="/wp-json/salon/v1/customers") AND user_agent NOT LIKE "%admin%"

🔗 References

📤 Share & Export