CVE-2026-1932

5.3 MEDIUM

📋 TL;DR

The Bookr WordPress plugin has an authentication bypass vulnerability in its REST API endpoint that allows unauthenticated attackers to modify appointment statuses. This affects all WordPress sites using Bookr plugin versions 1.0.2 and earlier. Attackers can disrupt business operations by changing appointment confirmations, cancellations, or other statuses.

💻 Affected Systems

Products:
  • WordPress Appointment Booking Calendar Plugin – Bookr
Versions: All versions up to and including 1.0.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Bookr plugin active. The vulnerability exists in the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically cancel or modify all appointments, causing significant business disruption, financial loss, and reputational damage to organizations relying on appointment bookings.

🟠

Likely Case

Attackers modify random appointments to cause confusion, disrupt operations, or test for other vulnerabilities in the system.

🟢

If Mitigated

With proper network segmentation and API monitoring, impact is limited to appointment system disruption without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves simple HTTP requests to the REST API endpoint. Attack tools could easily automate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/bookr/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Appointment Booking Calendar Plugin – Bookr'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin, then install fresh version 1.0.3+ from WordPress repository.

🔧 Temporary Workarounds

Disable Bookr Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate bookr

Block REST API Endpoint

linux

Block access to the vulnerable REST API endpoint using web server rules

# Apache: RewriteRule ^/wp-json/bookr/v1/update-appointment - [F,L]
# Nginx: location ~* /wp-json/bookr/v1/update-appointment { return 403; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to /wp-json/bookr/v1/update-appointment endpoint
  • Monitor and alert on unauthorized modifications to appointment data in database logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Bookr version. If version is 1.0.2 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=bookr --field=version

Verify Fix Applied:

After update, verify Bookr plugin version is 1.0.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-json/bookr/v1/update-appointment from unauthenticated users
  • Database modifications to wp_bookr_appointments table without corresponding user authentication

Network Indicators:

  • Unusual volume of POST requests to WordPress REST API endpoints
  • Traffic to /wp-json/bookr/v1/update-appointment from unexpected IP ranges

SIEM Query:

source="web_server" AND uri_path="/wp-json/bookr/v1/update-appointment" AND http_method="POST" AND user="-"

🔗 References

📤 Share & Export