CVE-2026-1920
Received Received - Intake
Unauthorized Modification in Booktics Plugin Allows Addon Installation

Publication date: 2026-03-10

Last updated on: 2026-03-10

Assigner: Wordfence

Description
The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'Extension_Controller::update_item_permissions_check' function in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to install addon plugins.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
booktics booktics to 1.0.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress has a vulnerability due to a missing capability check in the 'Extension_Controller::update_item_permissions_check' function in all versions up to 1.0.16."}, {'type': 'paragraph', 'content': "This missing permission check allows unauthenticated attackers to perform unauthorized modifications, specifically enabling them to install addon plugins via the plugin's REST API endpoints."}, {'type': 'paragraph', 'content': "The core issue is that the permission check methods in the extension controller returned 'true' unconditionally, allowing any user, including unauthenticated ones, to update or install extensions without restriction."}] [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker without authentication to install addon plugins on your WordPress site running the Booktics plugin.

Installing unauthorized addons can lead to further compromise of your site, including potential introduction of malicious code, unauthorized access, or disruption of service.

The CVSS score of 5.3 (medium severity) reflects the potential for integrity impact (unauthorized modification of data) without direct impact on confidentiality or availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking if the Booktics plugin's REST API endpoints related to extensions allow unauthorized access to update or install addon plugins without proper capability checks."}, {'type': 'paragraph', 'content': 'Specifically, the endpoints at /booktics/v1/extensions (GET and POST/PUT) can be tested to see if unauthenticated or low-privilege users can perform actions such as installing or activating addons.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect this vulnerability include using curl to attempt to update or install an addon without authentication:'}, {'type': 'list_item', 'content': 'curl -X POST https://yourwordpresssite.com/wp-json/booktics/v1/extensions -d \'{"name":"addon_name","status":"install"}\' -H \'Content-Type: application/json\''}, {'type': 'list_item', 'content': 'curl -X PUT https://yourwordpresssite.com/wp-json/booktics/v1/extensions -d \'{"name":"addon_name","status":"activate"}\' -H \'Content-Type: application/json\''}, {'type': 'paragraph', 'content': 'If these commands succeed without authentication or proper permissions, the system is vulnerable.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include restricting access to the vulnerable REST API endpoints by ensuring proper capability checks are in place.'}, {'type': 'paragraph', 'content': "Specifically, update the Booktics plugin to a version where the permission checks for 'get_items_permissions_check' and 'update_item_permissions_check' methods require the 'manage_options' capability, limiting access to administrators only."}, {'type': 'paragraph', 'content': "If an update is not immediately available, consider applying a patch that modifies these permission check functions to return current_user_can('manage_options')."}, {'type': 'paragraph', 'content': 'Additionally, monitor and restrict access to the REST API endpoints related to Booktics extensions, and consider disabling or removing the plugin if it is not essential.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart