VYPR
Medium severity6.5NVD Advisory· Published Aug 20, 2025· Updated Apr 23, 2026

CVE-2025-54040

CVE-2025-54040

Description

Missing Authorization vulnerability in Webba Appointment Booking Webba Booking webba-booking-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Webba Booking: from n/a through <= 5.1.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Webba Booking ≤5.1.20 allows attackers to exploit incorrectly configured access controls, potentially granting unauthorized privileges.

The Webba Booking plugin for WordPress (webba-booking-lite) versions through 5.1.20 contain a missing authorization vulnerability. The plugin fails to properly enforce access control security levels, allowing users to perform actions that should require higher privileges. This is classified as a broken access control issue, where authorization checks or nonce token validations are absent in certain functions [1].

Exploitation requires no authentication, making it accessible to any unprivileged user. The vulnerability is exposed via the plugin's functionality, and attackers can trigger it by sending crafted requests. Given that this is a WordPress plugin widely installed, the attack surface is significant, and the vulnerability is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of their size or popularity [1].

Successful exploitation can allow an attacker to gain unauthorized access to administrative actions, potentially leading to full site compromise. The CVSS v3 base score of 6.5 reflects the moderate severity but high potential for widespread abuse. The vulnerability is particularly dangerous because it can be leveraged without authentication and is expected to be actively exploited [1].

The vendor has addressed this issue in version 5.1.22. Immediate updating to version 5.1.22 or later is strongly recommended. For those unable to update, Patchstack provides a mitigation rule to block attacks until a patch is applied. Users are advised to enable auto-updates for vulnerable plugins where possible [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.