
Cloud Vulnerability DB
A community-led vulnerabilities database
The Online Booking & Scheduling Calendar for WordPress by vcita plugin (versions <= 4.2.10) was found to contain a missing authorization vulnerability (CVE-2023-2415). This security flaw was discovered on February 2, 2023, by researcher Jonas Höbenreich and was publicly disclosed on June 2, 2023. The plugin, which has over 3,000 active installations and approximately 400,000 downloads, is used for managing booking and scheduling functionalities in WordPress websites (Jonas Blog, Wordfence Intel).
The vulnerability has been assigned a CVSS score of 5.4 (Medium) and is characterized by a missing authorization control that allows logged-in users with minimal privileges (subscriber level) to perform unauthorized account logout actions. The technical implementation of the vulnerability exists in the plugin's AJAX functionality, which fails to properly verify user permissions before executing logout operations (Wordfence Intel).
When exploited, this vulnerability allows an attacker to log the administrator out of the vcita account, disrupting the website's booking functionality. This can result in website visitors being unable to make appointments, potentially leading to significant revenue loss for the website owner (Jonas Blog).
The vulnerability was addressed by vcita through an update released on June 12, 2023. Website administrators are strongly advised to update their Online Booking & Scheduling Calendar for WordPress by vcita plugin to a version newer than 4.2.10 to protect against this vulnerability (Jonas Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."