Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ladela
Ladela online Scheduling And Appointment Booking System – Bookly Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ladela
Ladela online Scheduling And Appointment Booking System – Bookly Wordpress Wordpress wordpress |
Thu, 09 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Online Scheduling and Appointment Booking System – Bookly plugin for WordPress is vulnerable to price manipulation via the 'tips' parameter in all versions up to, and including, 27.0. This is due to the plugin trusting a user-supplied input without server-side validation against the configured price. This makes it possible for unauthenticated attackers to submit a negative number to the 'tips' parameter, causing the total price to be reduced to zero. | |
| Title | Online Scheduling and Appointment Booking System – Bookly <= 27.0 - Unauthenticated Price Manipulation via 'tips' | |
| Weaknesses | CWE-472 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-13T15:15:09.493Z
Reserved: 2026-02-15T06:39:59.038Z
Link: CVE-2026-2519
Updated: 2026-04-13T15:11:53.345Z
Status : Deferred
Published: 2026-04-09T13:16:42.843
Modified: 2026-04-24T18:02:46.583
Link: CVE-2026-2519
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:32:51Z