VYPR
Medium severity4.3NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-54036

CVE-2025-54036

Description

Cross-Site Request Forgery (CSRF) vulnerability in Webba Appointment Booking Webba Booking webba-booking-lite allows Cross Site Request Forgery.This issue affects Webba Booking: from n/a through <= 5.1.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cross-Site Request Forgery (CSRF) in Webba Booking plugin for WordPress allows attackers to trick privileged users into performing unwanted actions.

Vulnerability

Overview

The Webba Booking plugin for WordPress (webba-booking-lite) contains a Cross-Site Request Forgery (CSRF) vulnerability in versions up to and including 5.1.20. This flaw allows attackers to craft malicious requests that, when triggered by an authenticated administrator or other privileged user, execute unwanted actions under the victim's session. The vulnerability stems from missing or insufficient CSRF token validation in certain plugin operations [1].

Exploitation

Prerequisites

Exploitation requires user interaction—an attacker must trick a logged-in user with sufficient privileges into clicking a link, visiting a crafted page, or submitting a specially crafted form. No direct authentication is needed for the attacker, but the victim must have an active session with the WordPress site and appropriate permissions (such as an Admin role). The vulnerability can be initiated remotely over the network [1].

Impact

Successful exploitation enables an attacker to force a privileged user to perform unintended actions within the plugin's context, such as modifying booking settings, deleting appointments, or other administrative operations. The CVSS v3 score is 4.3 (Medium), indicating a low-to-moderate severity due to the required user interaction and limited impact on confidentiality or availability [1].

Mitigation

The vendor has addressed the vulnerability in version 5.1.21. Users are strongly advised to update the plugin immediately. For those unable to update immediately, enabling auto-updates for vulnerable plugins (e.g., via Patchstack) or seeking assistance from a hosting provider or developer is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.