[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fKhddln3FU5RbEvQH7KxBaghR0GU8ggGVO70X-bGb4c4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":9,"severity":11,"cvss_score":12,"cvss_vector":13,"vuln_type":14,"published_date":15,"updated_date":16,"references":17,"days_to_patch":9},"CVE-2026-27389","wedesigntech-ultimate-booking-addon-authentication-bypass","WeDesignTech Ultimate Booking Addon \u003C= 1.0.1 - Authentication Bypass","The WeDesignTech Ultimate Booking Addon plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.1. This makes it possible for unauthenticated attackers to bypass authentication and log in as other users, which may include administrators.","wedesigntech-ultimate-booking-addon",null,"\u003C=1.0.1","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authentication Bypass Using an Alternate Path or Channel","2026-02-23 00:00:00","2026-03-05 17:58:31",[18],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7f26cf69-5dad-41ab-b302-6d4a753a9586?source=api-prod"]