Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-67970

Summary
Assigner-Patchstack
Assigner Org ID-21595511-bba5-4825-b968-b78d1f9984a3
Published At-20 Feb, 2026 | 15:46
Updated At-24 Feb, 2026 | 21:57
Rejected At-
Credits

WordPress Schedula plugin <= 1.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in vertim Schedula schedula-smart-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schedula: from n/a through <= 1.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Patchstack
Assigner Org ID:21595511-bba5-4825-b968-b78d1f9984a3
Published At:20 Feb, 2026 | 15:46
Updated At:24 Feb, 2026 | 21:57
Rejected At:
▼CVE Numbering Authority (CNA)
WordPress Schedula plugin <= 1.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in vertim Schedula schedula-smart-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schedula: from n/a through <= 1.0.

Affected Products
Vendor
vertim
Product
Schedula
Collection URL
https://wordpress.org/plugins
Package Name
schedula-smart-appointment-booking
Default Status
unaffected
Versions
Affected
  • From n/a through <= 1.0 (custom)
    • -> unaffectedfrom1.1
Problem Types
TypeCWE IDDescription
CWECWE-862Missing Authorization
Type: CWE
CWE ID: CWE-862
Description: Missing Authorization
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-180Exploiting Incorrectly Configured Access Control Security Levels
CAPEC ID: CAPEC-180
Description: Exploiting Incorrectly Configured Access Control Security Levels
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Ty5ona | Patchstack Bug Bounty Program
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://patchstack.com/database/Wordpress/Plugin/schedula-smart-appointment-booking/vulnerability/wordpress-schedula-plugin-1-0-broken-access-control-vulnerability?_s_id=cve
vdb-entry
Hyperlink: https://patchstack.com/database/Wordpress/Plugin/schedula-smart-appointment-booking/vulnerability/wordpress-schedula-plugin-1-0-broken-access-control-vulnerability?_s_id=cve
Resource:
vdb-entry
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:audit@patchstack.com
Published At:20 Feb, 2026 | 16:22
Updated At:24 Feb, 2026 | 22:16

Missing Authorization vulnerability in vertim Schedula schedula-smart-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schedula: from n/a through <= 1.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-862Secondaryaudit@patchstack.com
CWE ID: CWE-862
Type: Secondary
Source: audit@patchstack.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://patchstack.com/database/Wordpress/Plugin/schedula-smart-appointment-booking/vulnerability/wordpress-schedula-plugin-1-0-broken-access-control-vulnerability?_s_id=cveaudit@patchstack.com
N/A
Hyperlink: https://patchstack.com/database/Wordpress/Plugin/schedula-smart-appointment-booking/vulnerability/wordpress-schedula-plugin-1-0-broken-access-control-vulnerability?_s_id=cve
Source: audit@patchstack.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

407Records found

CVE-2024-54466
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 29.39%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 22:59
Updated-03 Nov, 2025 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An encrypted volume may be accessed by a different user without prompting for the password.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-862
Missing Authorization
CVE-2024-55408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.16% / 36.98%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 00:00
Updated-11 Feb, 2025 | 01:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper access control vulnerability in the AsusSAIO.sys driver may lead to the misuse of software functionality utilizing the driver when crafted IOCTL requests are supplied.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-ASCI
CWE ID-CWE-862
Missing Authorization
CVE-2024-6845
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-5.3||MEDIUM
EPSS-22.08% / 95.67%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 06:00
Updated-20 Jan, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SmartSearchWP < 2.4.6 - Unauthenticated OpenAI Key Disclosure

The Chatbot with ChatGPT WordPress plugin before 2.4.6 does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key

Action-Not Available
Vendor-webdigitUnknownsmartsearchwp
Product-chatbot_with_chatgptChatbot with ChatGPT WordPresschatbot_with_chatgpt_wordpress
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-6626
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.71% / 71.86%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 06:43
Updated-08 Nov, 2024 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EleForms – All In One Form Integration including DB for Elementor <= 2.9.9.9 - Missing Authorization

The EleForms – All In One Form Integration including DB for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on several functions in all versions up to, and including, 2.9.9.9. This makes it possible for unauthenticated attackers to view form submissions.

Action-Not Available
Vendor-theinnovscscodethelnnovs
Product-eleformsEleForms – All In One Form Integration including DB for Elementoreleforms
CWE ID-CWE-862
Missing Authorization
CVE-2023-40005
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.61% / 69.26%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 14:24
Updated-07 Feb, 2025 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Easy Digital Downloads plugin <= 3.1.5 - Broken Access Control

Missing Authorization vulnerability in Easy Digital Downloads Easy Digital Downloads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Digital Downloads: from n/a through 3.1.5.

Action-Not Available
Vendor-Sandhills Development, LLC (EasyDigitalDownloads)Awesome Motive Inc.
Product-easy_digital_downloadsEasy Digital Downloads
CWE ID-CWE-862
Missing Authorization
CVE-2024-46887
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.25% / 47.86%
||
7 Day CHG+0.07%
Published-08 Oct, 2024 | 08:40
Updated-21 Oct, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC ET 200SP CPU 1512SP F-1 PNSIMATIC S7-1500 CPU 1517TF-3 PN/DPSIMATIC ET 200SP CPU 1514SP-2 PNSIMATIC S7-1500 CPU 1516TF-3 PN/DPSIMATIC S7-1500 CPU 1515F-2 PNSIPLUS S7-1500 CPU 1511F-1 PNSIMATIC S7-1500 Software Controller CPU 1507S F V3SIMATIC S7-1500 CPU 1515T-2 PNSIMATIC S7-1500 Software Controller CPU 1508S V3SIMATIC S7-PLCSIM AdvancedSIMATIC S7-1500 Software Controller CPU 1507S V3SIMATIC S7-1500 CPU 1515TF-2 PNSIMATIC S7-1500 CPU 1511C-1 PNSIPLUS S7-1500 CPU 1516-3 PN/DP TX RAILSIMATIC S7-1500 CPU 1513pro-2 PNSIPLUS S7-1500 CPU 1513-1 PNSIMATIC S7-1500 CPU 1516pro F-2 PNSIMATIC S7-1500 Software Controller CPU 1508S T V3SIMATIC S7-1500 CPU 1512C-1 PNSIMATIC ET 200SP CPU 1514SPT-2 PNSIMATIC S7-1500 CPU 1513F-1 PNSIMATIC S7-1500 Software Controller CPU 1508S V2SIPLUS ET 200SP CPU 1512SP-1 PNSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUs - Windows OSSIPLUS S7-1500 CPU 1516-3 PN/DP RAILSIPLUS ET 200SP CPU 1510SP-1 PNSIPLUS ET 200SP CPU 1512SP F-1 PN RAILSIMATIC S7-1500 CPU 1516F-3 PN/DPSIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PNSIMATIC S7-1500 CPU S7-1518-4 PN/DP ODKSIPLUS S7-1500 CPU 1515F-2 PN RAILSIMATIC ET 200SP CPU 1514SP F-2 PNSIPLUS S7-1500 CPU 1515F-2 PN T2 RAILSIMATIC S7-1500 CPU 1511TF-1 PNSIPLUS ET 200SP CPU 1512SP-1 PN RAILSIMATIC S7-1500 Software Controller CPU 1508S F V3SIMATIC S7-1500 Software Controller CPU 1507S F V2SIPLUS S7-1500 CPU 1516F-3 PN/DP RAILSIPLUS S7-1500 CPU 1518-4 PN/DPSIMATIC S7-1500 CPU 1517T-3 PN/DPSIMATIC ET 200SP CPU 1514SPT F-2 PNSIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PNSIMATIC Drive Controller CPU 1504D TFSIMATIC S7-1500 Software Controller Linux V3SIMATIC S7-1500 CPU 1518F-4 PN/DPSIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PNSIMATIC S7-1500 Software Controller CPU 1508S F V2SIPLUS ET 200SP CPU 1510SP F-1 PNSIMATIC S7-1500 CPU 1518T-4 PN/DPSIMATIC S7-1500 CPU 1518-4 PN/DP MFPSIMATIC S7-1500 CPU 1516T-3 PN/DPSIPLUS ET 200SP CPU 1510SP F-1 PN RAILSIPLUS S7-1500 CPU 1511-1 PN T1 RAILSIMATIC S7-1500 CPU 1516pro-2 PNSIMATIC S7-1500 CPU 1517F-3 PN/DPSIPLUS S7-1500 CPU 1511-1 PN TX RAILSIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PNSIMATIC Drive Controller CPU 1507D TFSIMATIC S7-1500 CPU 1513-1 PNSIMATIC S7-1500 CPU 1513pro F-2 PNSIMATIC S7-1500 CPU 1517-3 PN/DPSIPLUS S7-1500 CPU 1516-3 PN/DPSIMATIC S7-1500 CPU 1515-2 PNSIPLUS ET 200SP CPU 1512SP F-1 PNSIPLUS S7-1500 CPU 1518F-4 PN/DPSIMATIC S7-1500 CPU 1511F-1 PNSIMATIC ET 200SP CPU 1510SP F-1 PNSIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODKSIPLUS ET 200SP CPU 1510SP-1 PN RAILSIPLUS S7-1500 CPU 1518-4 PN/DP MFPSIPLUS S7-1500 CPU 1515F-2 PNSIPLUS S7-1500 CPU 1516F-3 PN/DPSIPLUS S7-1500 CPU 1511-1 PNSIMATIC ET 200SP CPU 1510SP-1 PNSIMATIC S7-1500 CPU 1518-4 PN/DPSIMATIC S7-1500 Software Controller CPU 1507S V2SIMATIC S7-1500 CPU 1516-3 PN/DPSIMATIC ET 200SP CPU 1512SP-1 PNSIMATIC S7-1500 CPU 1511-1 PNSIMATIC S7-1500 CPU 1518TF-4 PN/DPSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs - Windows OSSIMATIC S7-1500 CPU 1518F-4 PN/DP MFPSIMATIC S7-1500 Software Controller CPU 1508S TF V3SIPLUS S7-1500 CPU 1513F-1 PNSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs - Industrial OSSIMATIC S7-1500 CPU 1511T-1 PNSIMATIC S7-1500 Software Controller Linux V2
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-862
Missing Authorization
CVE-2023-29529
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-0.32% / 54.30%
||
7 Day CHG~0.00%
Published-14 Apr, 2023 | 18:21
Updated-06 Feb, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
matrix-js-sdk vulnerable to invisible eavesdropping in group calls

matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. An attacker present in a room where an MSC3401 group call is taking place can eavesdrop on the video and audio of participants using matrix-js-sdk, without their knowledge. To affected matrix-js-sdk users, the attacker will not appear to be participating in the call. This attack is possible because matrix-js-sdk's group call implementation accepts incoming direct calls from other users, even if they have not yet declared intent to participate in the group call, as a means of resolving a race condition in call setup. Affected versions do not restrict access to the user's outbound media in this case. Legacy 1:1 calls are unaffected. This is fixed in matrix-js-sdk 24.1.0. As a workaround, users may hold group calls in private rooms where only the exact users who are expected to participate in the call are present.

Action-Not Available
Vendor-The Matrix.org Foundation
Product-javascript_sdkmatrix-js-sdk
CWE ID-CWE-862
Missing Authorization
  • Previous
  • 1
  • 2
  • ...
  • 7
  • 8
  • 9
  • Next
Details not found