Home

Description

The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure due to a missing authorization check on the 'get_customer_list' route in all versions up to, and including, 1.0.8. This makes it possible for unauthenticated attackers to retrieve sensitive customer information including names, emails, phone numbers, dates of birth, and gender.

PUBLISHED Reserved 2026-02-05 | Published 2026-03-04 | Updated 2026-03-04 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-05:Vendor Notified
2026-03-03:Disclosed

Credits

MD. TAREQ AHAMED JONY finder

References

www.wordfence.com/...-29d7-46a4-bfaf-c65e8a44c2ed?source=cve

plugins.trac.wordpress.org/...ses/class.wpb-admin-routes.php

plugins.trac.wordpress.org/...ses/class.wpb-admin-routes.php

plugins.trac.wordpress.org/...wpbookit&sfp_email=&sfph_mail=

cve.org (CVE-2026-1980)

nvd.nist.gov (CVE-2026-1980)

Download JSON