CVE-2025-63012
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Lifecycle Timeline
2Description
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Hotel Booking wp-hotel-booking allows Cross Site Request Forgery.This issue affects WP Hotel Booking: from n/a through <= 2.2.8.
Analysis
Cross-site request forgery in ThimPress WP Hotel Booking plugin version 2.2.8 and earlier allows unauthenticated remote attackers to perform unauthorized actions on behalf of authenticated users through crafted requests. The vulnerability requires user interaction (clicking a malicious link) and results in limited information disclosure, with a CVSS score of 4.3. Exploitation probability is very low per EPSS (0.02% percentile 5%), suggesting this is a lower-priority vulnerability despite public researcher disclosure.
Technical Context
Cross-site request forgery (CWE-352) occurs when a web application fails to validate that requests originate from legitimate sources. In this WordPress plugin, the vulnerability stems from insufficient CSRF token validation on state-changing operations. The affected plugin (wp-hotel-booking, CPE: wp:wp-hotel-booking) is a WordPress plugin providing hotel booking functionality. WordPress plugins execute within the WordPress application context and can access sensitive booking and user data. The lack of proper nonce validation or CSRF tokens on hotel booking operations (such as reservation modifications or cancellations) allows attackers to forge requests that execute with the privileges of logged-in users who visit attacker-controlled pages.
Affected Products
ThimPress WP Hotel Booking plugin (wp-hotel-booking) version 2.2.8 and all earlier versions are affected. The plugin is distributed through WordPress.org and is identified by CPE wp:wp-hotel-booking. Additional details and vulnerability tracking are available at the Patchstack vulnerability database: https://patchstack.com/database/Wordpress/Plugin/wp-hotel-booking/vulnerability/wordpress-wp-hotel-booking-plugin-2-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
Remediation
Update the WP Hotel Booking plugin to the patched version released after 2.2.8. Site administrators should navigate to WordPress Dashboard → Plugins → Installed Plugins, locate WP Hotel Booking, and install the latest available version. If a patched version is not yet available, implement temporary mitigation by disabling the plugin until an update is released, or restrict access to the WordPress admin and booking functionality to known IP addresses. The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp-hotel-booking/vulnerability/wordpress-wp-hotel-booking-plugin-2-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve contains additional guidance and patch availability confirmation.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today