Atomic Edge analysis of CVE-2026-1932 (metadata-based):
This vulnerability allows unauthenticated attackers to modify the status of any appointment in the Appointment Booking Calendar Plugin – Bookr for WordPress versions up to and including 1.0.2. The issue resides in the plugin’s REST API endpoint handling, specifically the update-appointment endpoint. The CVSS score of 5.3 (Medium) reflects the network accessibility, low attack complexity, and integrity impact without confidentiality or availability loss.
Atomic Edge research identifies the root cause as a missing capability check (CWE-862) on the update-appointment REST API endpoint. The vulnerability description confirms the absence of an authorization mechanism. Without source code, we infer the endpoint likely uses the WordPress REST API infrastructure, registers a route without proper permission_callback, and directly processes user-supplied parameters. This inference aligns with the CWE classification and common WordPress plugin patterns where REST endpoints omit the permission_callback parameter in register_rest_route().
Exploitation requires sending an HTTP request to the vulnerable REST endpoint. The attacker crafts a POST or PUT request to /wp-json/bookr/v1/update-appointment (the exact namespace is inferred from plugin slug conventions). The payload includes parameters like appointment_id and status. No authentication headers or cookies are needed. A sample request uses curl -X POST https://target.site/wp-json/bookr/v1/update-appointment -d ‘appointment_id=123&status=cancelled’. Attackers can enumerate appointment IDs or intercept legitimate appointment IDs from public pages.
Remediation requires implementing proper authorization checks. The plugin must add a permission_callback function to the register_rest_route() call for the update-appointment endpoint. This callback should verify the user has appropriate capabilities (like manage_options or a custom appointment_management capability). The fix should also validate the current user’s permissions against the target appointment’s ownership or administrative rights. WordPress REST API best practices mandate permission_callback for all routes modifying data.
The impact is unauthorized modification of appointment statuses. Attackers can cancel, confirm, or reschedule appointments, disrupting business operations, causing financial loss, and damaging trust. While the vulnerability does not permit data theft or full system compromise, it enables denial-of-service against the booking system. Malicious actors could mass-cancel appointments or create confusion by altering statuses. The integrity impact is direct, with potential secondary impacts on service delivery and reputation.







