{"api_version":"1","generated_at":"2026-04-21T18:04:11+00:00","cve":"CVE-2022-0825","urls":{"html":"https://cve.report/CVE-2022-0825","api":"https://cve.report/api/cve/CVE-2022-0825.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0825","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0825"},"summary":{"title":"CVE-2022-0825","description":"The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-04-04 16:15:00","updated_at":"2022-06-03 16:19:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e","name":"https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/changeset/2693545","name":"https://plugins.trac.wordpress.org/changeset/2693545","refsource":"CONFIRM","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0825","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0825","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Huli from Cymetrics","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"825","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tms-outsource","cpe5":"amelia","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-0825","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Amelia < 1.0.49 - Customer+ Arbitrary Appointments Status Update"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Amelia – Events & Appointments Booking Calendar","version":{"version_data":[{"version_affected":"<","version_name":"1.0.49","version_value":"1.0.49"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e","name":"https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e"},{"refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2693545","name":"https://plugins.trac.wordpress.org/changeset/2693545"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-863 Incorrect Authorization","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Huli from Cymetrics"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-04-04 16:15:00","lastModifiedDate":"2022-06-03 16:19:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.0.49","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}