Vulnerability Description
The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure due to a missing authorization check on the 'get_customer_list' route in all versions up to, and including, 1.0.8. This makes it possible for unauthenticated attackers to retrieve sensitive customer information including names, emails, phone numbers, dates of birth, and gender.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wpbookit/tags/1.0.8/core/admin/classe
- https://plugins.trac.wordpress.org/browser/wpbookit/trunk/core/admin/classes/cla
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a1867c79-29d7-46a4-bfa
FAQ
What is CVE-2026-1980?
CVE-2026-1980 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure due to a missing authorization check on the 'get_customer_list' route in all versions up to, and including, 1.0.8. This ...
How severe is CVE-2026-1980?
CVE-2026-1980 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1980?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.