CVE-2025-13756

4.3 MEDIUM

📋 TL;DR

The Fluent Booking WordPress plugin has an authorization vulnerability that allows any authenticated user (including subscribers) to import and manage calendars without proper permissions. This affects all WordPress sites using Fluent Booking version 1.9.11 or earlier. Attackers can manipulate calendar data and potentially disrupt booking operations.

💻 Affected Systems

Products:
  • Fluent Booking WordPress Plugin
Versions: All versions up to and including 1.9.11
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Fluent Booking plugin enabled. All user roles with access to WordPress (subscriber and above) can exploit this vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could import malicious calendar data, overwrite legitimate bookings, disrupt business operations, or use the calendar system to distribute malicious links/content to users.

🟠

Likely Case

Unauthorized users import spam or inappropriate calendar entries, causing confusion and requiring manual cleanup of the booking system.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor data integrity issues that can be quickly identified and reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial for any WordPress user. The vulnerability is in a specific function with missing capability checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.10.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3404176/fluent-booking/tags/1.10.0/app/Hooks/Handlers/DataImporter.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Fluent Booking plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.10.0 from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary User Role Restriction

all

Temporarily restrict subscriber-level users from accessing the WordPress site while awaiting patch

Plugin Deactivation

linux

Temporarily deactivate Fluent Booking plugin if not critically needed

wp plugin deactivate fluent-booking

🧯 If You Can't Patch

  • Implement strict user role management - review and minimize users with subscriber access
  • Enable detailed logging of calendar import activities and monitor for unauthorized actions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Fluent Booking version. If version is 1.9.11 or lower, system is vulnerable.

Check Version:

wp plugin get fluent-booking --field=version

Verify Fix Applied:

After updating, verify Fluent Booking plugin shows version 1.10.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual calendar import activities from non-admin users
  • Multiple calendar import requests from single user accounts
  • Import requests to unexpected calendar sources

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=importCalendar from non-admin users

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "action=importCalendar") AND user_role!="administrator"

🔗 References

📤 Share & Export