CVE-2026-8684
Received Received - Intake
Authorization Bypass in MotoPress Hotel Booking Plugin

Publication date: 2026-05-22

Last updated on: 2026-05-22

Assigner: Wordfence

Description
The MotoPress Hotel Booking plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 6.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite or delete the internal notes (_mphb_booking_internal_notes) of any booking by supplying an arbitrary booking ID. The nonce for this action is output in the HTML source of every public page through wp_localize_script (MPHB._data.nonces), so any unauthenticated visitor can obtain a valid nonce and perform the action without any account or prior interaction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-22
Last Modified
2026-05-22
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
motopress hotel_booking to 6.0.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The MotoPress Hotel Booking plugin for WordPress has an authorization bypass vulnerability in all versions up to and including 6.0.1. This means the plugin does not properly check if a user is allowed to perform certain actions.

Because of this flaw, unauthenticated attackers can overwrite or delete internal notes of any booking by providing an arbitrary booking ID.

The vulnerability is worsened by the fact that a valid nonce (a security token) needed to perform this action is exposed in the HTML source of every public page, allowing any visitor to obtain it without needing an account or prior interaction.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to modify or delete internal booking notes, which could lead to data integrity issues.

Although it does not allow disclosure of sensitive data or denial of service, the integrity of booking information can be compromised, potentially disrupting hotel booking operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to overwrite or delete internal notes of any booking in the MotoPress Hotel Booking plugin by exploiting an authorization bypass. This could lead to unauthorized modification of booking data.

While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, unauthorized modification of booking information could potentially impact data integrity and confidentiality requirements under such regulations.

Specifically, GDPR requires protection of personal data against unauthorized alteration, and HIPAA mandates safeguarding patient information integrity. If booking notes contain personal or sensitive information, this vulnerability could pose compliance risks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart