CVE-2025-32220

5.4 MEDIUM

📋 TL;DR

A missing authorization vulnerability in the Dimitri Grassi Salon booking system WordPress plugin allows attackers to bypass access controls and perform unauthorized actions. This affects all versions up to 10.10.7. WordPress sites using this plugin are vulnerable.

💻 Affected Systems

Products:
  • Dimitri Grassi Salon booking system WordPress plugin
Versions: n/a through 10.10.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify booking data, access customer information, or disrupt business operations by manipulating the booking system.

🟠

Likely Case

Unauthorized users could view or modify booking details, potentially causing scheduling conflicts or data exposure.

🟢

If Mitigated

With proper access controls, only authorized users can access booking functions, limiting impact to intended functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of WordPress plugin structure but no advanced technical skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.10.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/salon-booking-system/vulnerability/wordpress-salon-booking-system-plugin-10-10-7-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Salon booking system' and click 'Update Now'. 4. Verify update to version 10.10.8 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate salon-booking-system

🧯 If You Can't Patch

  • Implement strict network access controls to limit plugin access to authorized users only.
  • Monitor plugin access logs for unauthorized activity patterns.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Salon booking system' version.

Check Version:

wp plugin get salon-booking-system --field=version

Verify Fix Applied:

Confirm plugin version is 10.10.8 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to booking system endpoints
  • Failed authorization attempts followed by successful booking modifications

Network Indicators:

  • Unexpected POST requests to booking system admin endpoints from unauthorized IPs

SIEM Query:

source="wordpress.log" AND "salon-booking-system" AND ("unauthorized" OR "access denied")

🔗 References

📤 Share & Export