Vulnerability Description
The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.96. This is due to the plugin exposing an unauthenticated booking processing endpoint (cpabc_appointments_check_IPN_verification) that trusts attacker-supplied payment notifications without verifying their origin, authenticity, or requiring proper authorization checks. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and insert them into the live calendar via the 'cpabc_ipncheck' parameter, triggering administrative and customer notification emails and disrupting operations.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/appointment-booking-calendar/tags/1.3
- https://plugins.trac.wordpress.org/browser/appointment-booking-calendar/tags/1.3
- https://plugins.trac.wordpress.org/browser/appointment-booking-calendar/tags/1.3
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/638217c4-7a37-49e4-866
FAQ
What is CVE-2025-13317?
CVE-2025-13317 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.96. This is due to the plugin exposing an unauthenticated booking...
How severe is CVE-2025-13317?
CVE-2025-13317 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-13317?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.