Vulnerability Description
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate changes to the `externalId` field when a Provider (Employee) user updates their own profile. The `externalId` maps directly to a WordPress user ID and is passed to `wp_set_password()` and `wp_update_user()` without authorization checks. This makes it possible for authenticated attackers, with Provider-level (Employee) access and above, to take over any WordPress account — including Administrator — by injecting an arbitrary `externalId` value when updating their own provider profile.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/ameliabooking/tags/2.1.3/src/Applicat
- https://plugins.trac.wordpress.org/browser/ameliabooking/tags/2.1.3/src/Applicat
- https://plugins.trac.wordpress.org/browser/ameliabooking/tags/2.1.3/src/Applicat
- https://plugins.trac.wordpress.org/browser/ameliabooking/tags/2.1.3/src/Applicat
- https://plugins.trac.wordpress.org/changeset/3499608/ameliabooking/trunk/src/App
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a4204099-1065-4167-8b4
FAQ
What is CVE-2026-5465?
CVE-2026-5465 is a vulnerability with a CVSS score of 8.8 (HIGH). The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `Update...
How severe is CVE-2026-5465?
CVE-2026-5465 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5465?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.