CVE-2025-54040
Description
Missing Authorization vulnerability in Webba Appointment Booking Webba Booking webba-booking-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Webba Booking: from n/a through <= 5.1.20.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing authorization in Webba Booking ≤5.1.20 allows attackers to exploit incorrectly configured access controls, potentially granting unauthorized privileges.
The Webba Booking plugin for WordPress (webba-booking-lite) versions through 5.1.20 contain a missing authorization vulnerability. The plugin fails to properly enforce access control security levels, allowing users to perform actions that should require higher privileges. This is classified as a broken access control issue, where authorization checks or nonce token validations are absent in certain functions [1].
Exploitation requires no authentication, making it accessible to any unprivileged user. The vulnerability is exposed via the plugin's functionality, and attackers can trigger it by sending crafted requests. Given that this is a WordPress plugin widely installed, the attack surface is significant, and the vulnerability is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of their size or popularity [1].
Successful exploitation can allow an attacker to gain unauthorized access to administrative actions, potentially leading to full site compromise. The CVSS v3 base score of 6.5 reflects the moderate severity but high potential for widespread abuse. The vulnerability is particularly dangerous because it can be leveraged without authentication and is expected to be actively exploited [1].
The vendor has addressed this issue in version 5.1.22. Immediate updating to version 5.1.22 or later is strongly recommended. For those unable to update, Patchstack provides a mitigation rule to block attacks until a patch is applied. Users are advised to enable auto-updates for vulnerable plugins where possible [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=5.1.20
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.