CVE-2026-2230

4.3 MEDIUM

📋 TL;DR

The Booking Calendar plugin for WordPress has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-level access and booking permissions to modify other users' plugin settings. This can disrupt booking calendar functionality for targeted users by altering display options and configuration settings.

💻 Affected Systems

Products:
  • Booking Calendar WordPress Plugin
Versions: All versions up to and including 10.14.14
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Booking Calendar plugin and users with Subscriber-level access and booking permissions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically modify all user settings, causing widespread booking system disruption, data inconsistency, and potential business impact for organizations relying on the calendar.

🟠

Likely Case

Targeted modification of specific users' settings causing localized booking functionality disruption and user confusion.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect unauthorized setting changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific permissions but is technically simple once access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 10.14.15 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3456856/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Booking Calendar plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Temporary User Permission Restriction

all

Temporarily remove booking permissions from Subscriber-level users until patch is applied

Plugin Deactivation

all

Temporarily deactivate Booking Calendar plugin if not critical for operations

🧯 If You Can't Patch

  • Implement strict access controls to limit booking permissions to trusted users only
  • Enable detailed logging of user setting changes and monitor for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Booking Calendar → Version number. If version is 10.14.14 or lower, system is vulnerable.

Check Version:

wp plugin list --name=booking --field=version (if WP-CLI is installed)

Verify Fix Applied:

Verify Booking Calendar plugin version is 10.14.15 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user setting modifications in WordPress logs
  • Multiple setting changes from single user account in short timeframe

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with save-user-meta actions

SIEM Query:

source="wordpress.log" action="save_user_meta" user_role="subscriber"

🔗 References

📤 Share & Export