VYPR
Medium severity6.5NVD Advisory· Published Feb 20, 2026· Updated Apr 28, 2026

CVE-2025-68005

CVE-2025-68005

Description

Missing Authorization vulnerability in themewant Easy Hotel Booking easy-hotel allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Hotel Booking: from n/a through <= 1.9.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Easy Hotel Booking WordPress plugin through version 1.9.2 has a missing authorization vulnerability allowing unprivileged users to exploit broken access control.

Analysis

The Easy Hotel Booking WordPress plugin (versions up to and including 1.9.2) suffers from a missing authorization vulnerability [1]. The flaw lies in incorrectly configured access control security levels, meaning that certain functions or endpoints do not properly verify whether the user has the required permissions or a valid nonce token [1]. This is a classic 'Broken Access Control' issue in the WordPress ecosystem.

Exploitation

An attacker does not need any special privileges to exploit this vulnerability; it can be triggered by any unauthenticated or low-privileged user [1]. Since the plugin fails to enforce authorization checks, an attacker can directly call sensitive functions that should be restricted to higher-privileged roles such as administrators [1]. The attack vector is over the network and requires no user interaction.

Impact

Successful exploitation allows an attacker to perform unauthorized actions within the plugin's scope, such as modifying hotel booking settings, accessing or altering reservations, or escalating privileges [1]. This could lead to data integrity compromises and disruption of the booking system. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns against thousands of websites [1].

Mitigation

Users are advised to immediately update the Easy Hotel Booking plugin to a patched version beyond 1.9.2 [1]. If an update is not yet available, site owners should contact the plugin vendor or a web developer to implement a workaround, such as disabling the plugin until a fix is released [1]. No EOL or KEV listing is mentioned in the reference, but the vendor Patchstack has published detailed advisory information.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.