VYPR
Medium severity5.3NVD Advisory· Published Dec 9, 2025· Updated Apr 27, 2026

CVE-2025-67581

CVE-2025-67581

Description

Missing Authorization vulnerability in themetechmount TrueBooker truebooker-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TrueBooker: from n/a through <= 1.1.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

TrueBooker plugin ≤1.1.0 has a missing authorization vulnerability allowing unprivileged users to exploit incorrectly configured access controls.

Vulnerability

Overview The TrueBooker appointment booking plugin for WordPress, versions up to and including 1.1.0, contains a missing authorization vulnerability. The root cause is a broken access control mechanism, where the plugin fails to properly verify user permissions or nonce tokens before executing certain higher-privileged actions [1]. This flaw falls under the category of incorrectly configured access control security levels.

Exploitation

Conditions An attacker does not need any special privileges to exploit this vulnerability. The missing authorization check allows an unauthenticated or low-privileged user to perform actions that should be restricted to higher-privileged roles, such as administrators. The attack surface is the WordPress admin interface or AJAX endpoints exposed by the plugin, which lack proper capability checks [1].

Impact

Successful exploitation enables an attacker to bypass of intended access restrictions, potentially leading to unauthorized modification of booking data, settings, or other sensitive operations. The CVSS v3 base score is 5.3 (Medium), indicating a moderate severity. While the vulnerability is considered low risk and unlikely to be widely exploited, it could be used in mass-exploit campaigns targeting thousands of sites [1].

Mitigation

The vendor has released version 1.1.1 which addresses the issue. Users are strongly advised to update immediately. For Patchstack users, enabling auto-update for vulnerable plugins is recommended. If unable to update, contacting the hosting provider or web developer for assistance is advised [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.