CVE-2025-7540
Booking · Booking Multiple Products
A high-severity vulnerability has been identified in multiple products from Booking, affecting their online appointment systems.
Executive summary
A high-severity vulnerability has been identified in multiple products from Booking, affecting their online appointment systems. This flaw could allow an unauthorized attacker to access and potentially modify sensitive customer appointment data and personal information. Organizations using the affected software are at significant risk of a data breach, which could lead to reputational damage and regulatory penalties.
Vulnerability
The vulnerability is an Insecure Direct Object Reference (IDOR) within the appointment management function. Authenticated users can manipulate unique identifiers (e.g., appointment_id) in URL parameters or API requests to bypass access controls. By systematically iterating through these identifiers, an attacker can view, modify, or cancel appointments belonging to other users, thereby gaining unauthorized access to their Personally Identifiable Information (PII) and service details.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could lead to a significant data breach, exposing sensitive customer information such as names, contact details, and appointment specifics. The direct business impact includes a loss of customer trust, potential financial losses from fraudulent activity, and the risk of substantial fines under data protection regulations like GDPR or CCPA. Furthermore, the organization's brand and reputation could be severely damaged, impacting long-term customer loyalty and revenue.
Remediation
Immediate Action: Immediately apply the security patches provided by the vendor across all affected systems. After patching, it is critical to review access logs for any signs of anomalous activity preceding the update to identify potential historical compromises.
Proactive Monitoring: Security teams should actively monitor web server and application logs for suspicious access patterns. Specifically, look for a single user account or IP address making numerous sequential requests to appointment-related endpoints while iterating through numerical or predictable identifiers. Configure alerts for high rates of failed access attempts or unusual data access patterns that deviate from normal user behavior.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or flag requests that exhibit scanning behavior (e.g., a single session rapidly requesting hundreds of different appointment IDs). Enforce stricter session validation and ensure that user permissions are correctly checked on the server-side for every data access request as a temporary mitigation.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high-severity rating and the direct risk to sensitive customer data, it is strongly recommended that organizations prioritize the deployment of the vendor-supplied security updates immediately. Although there is no evidence of active exploitation, vulnerabilities of this nature are attractive targets for threat actors. Proactive patching is the most effective defense and is crucial for preventing a potential data breach and protecting the organization's reputation.