CVE-2025-12685
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-02

Last updated on: 2026-01-02

Assigner: WPScan

Description
The WPBookit WordPress plugin through 1.0.7 lacks a CSRF check when deleting customers. This could allow an unauthenticated attacker to delete any customer through a CSRF attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-02
Last Modified
2026-01-02
Generated
2026-05-07
AI Q&A
2026-01-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wpbookit wpbookit to 1.0.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12685 is a Cross-Site Request Forgery (CSRF) vulnerability in the WPBookit WordPress plugin up to version 1.0.7. The plugin lacks CSRF protection when deleting customers, which means an attacker can trick an authenticated user into unknowingly sending a malicious request that deletes any customer. This can be done without the attacker being authenticated themselves, exploiting the absence of proper verification in the delete customer action. [1]


How can this vulnerability impact me? :

This vulnerability can allow an unauthenticated attacker to delete any customer from the WPBookit plugin by exploiting the CSRF flaw. This could lead to loss of customer data, disruption of service, and potential damage to business operations relying on the plugin for customer management. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the CSRF attack using a curl command that sends a POST request to the WordPress admin AJAX endpoint (`wp-admin/admin-ajax.php`) with parameters `action=wpb_ajax_post`, `route_name=delete_customer`, and `delete_user_id=ID_USER` where `ID_USER` is the target customer's user ID. Monitoring for such suspicious POST requests targeting this endpoint with these parameters can help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

As of the latest update, no fix is available for this issue. Immediate mitigation steps include restricting access to the WordPress admin AJAX endpoint to trusted users only, implementing additional CSRF protections at the web server or application firewall level, and monitoring for suspicious requests that match the attack pattern. Additionally, consider disabling or removing the WPBookit plugin until a patch is released. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart