Atomic Edge analysis of CVE-2025-67915:
This vulnerability is an incorrect authorization flaw in the Timetics WordPress appointment booking plugin. It allows authenticated attackers with Timetics Customer-level access or higher to create arbitrary user accounts. The vulnerability affects all plugin versions up to and including 1.0.46, with a CVSS score of 5.3 (Medium severity).
Atomic Edge research identifies the root cause in the `api-customer.php` file within the plugin’s core customers directory. The `create_customer()` function at line 284 performs an insufficient capability check. The original code only verifies if the current user has the `manage_timetics` capability. This check fails to account for WordPress administrators who typically possess the `manage_options` capability but might not have the specific plugin-managed capability. The vulnerability exists because the authorization logic uses an OR condition incorrectly implemented as a single check.
Exploitation requires an authenticated attacker with Timetics Customer-level permissions or higher. The attacker sends a POST request to the WordPress REST API endpoint `/wp-json/timetics/v1/customers`. The request must include valid WordPress authentication cookies or nonce headers. The payload contains user creation parameters such as `first_name`, `last_name`, `email`, and `password`. Since the endpoint only checks for `manage_timetics` capability, any user with the Timetics Customer role can bypass authorization and create new user accounts with arbitrary privileges.
The patch modifies line 284 in `timetics/core/customers/api-customer.php`. The fix changes the capability check from `! current_user_can( ‘manage_timetics’ )` to `! current_user_can( ‘manage_timetics’ ) && ! current_user_can( ‘manage_options’ )`. This correction implements proper logical AND conditions requiring users to possess either the plugin-specific `manage_timetics` capability OR the WordPress administrator `manage_options` capability. The patch ensures only administrators with proper privileges can create customer accounts through this endpoint.
Successful exploitation enables privilege escalation through arbitrary user creation. Attackers can create administrator accounts, compromise site integrity, and gain full control over the WordPress installation. The vulnerability violates the principle of least privilege by allowing lower-privileged users to perform administrative actions. Atomic Edge analysis confirms this creates a direct path from authenticated customer access to complete site compromise.







