CVE-2025-10124

4.5 MEDIUM

📋 TL;DR

The Booking Manager WordPress plugin before version 2.1.15 contains a shortcode that deletes bookings when a page containing it is visited. This vulnerability allows any user with contributor-level privileges or higher to delete bookings without proper authorization. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Booking Manager WordPress Plugin
Versions: All versions before 2.1.15
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Booking Manager plugin and at least one user with contributor or higher privileges.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious contributor or higher-privileged user deletes all bookings, causing business disruption, data loss, and potential financial impact for booking-dependent businesses.

🟠

Likely Case

Accidental or intentional deletion of bookings by authorized users who shouldn't have this capability, leading to data loss and operational issues.

🟢

If Mitigated

Minimal impact if proper user access controls and monitoring are in place to detect unauthorized booking deletions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access and knowledge of the vulnerable shortcode. No authentication bypass needed beyond standard WordPress user roles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.15

Vendor Advisory: https://wpscan.com/vulnerability/9bb0589f-34bb-40e1-b7f0-ee883b7b896c/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Booking Manager plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually update to version 2.1.15 or later from WordPress repository.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily remove contributor-level access to booking management functions or demote users to subscriber role.

Disable Shortcode Execution

all

Remove or disable the vulnerable shortcode from all pages/posts using WordPress content editor.

🧯 If You Can't Patch

  • Implement strict user role management and limit contributor privileges
  • Enable comprehensive logging and monitoring of booking deletions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Booking Manager version. If version is below 2.1.15, system is vulnerable.

Check Version:

WordPress admin panel or wp plugin list --field=version --name='booking-manager' via WP-CLI

Verify Fix Applied:

Confirm Booking Manager plugin version is 2.1.15 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected booking deletions in plugin logs
  • WordPress user activity logs showing contributors accessing booking-related functions

Network Indicators:

  • HTTP requests to pages containing the vulnerable shortcode from contributor-level users

SIEM Query:

source="wordpress" AND (event="booking_deleted" OR event="shortcode_execution") AND user_role="contributor"

🔗 References

📤 Share & Export