First published: Mon Apr 10 2023(Updated: )
A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5 on WordPress. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The patch is named e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codepeople Cp Appointment Calendar | <=1.1.5 | |
<=1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-10099 is critical.
The affected software of CVE-2015-10099 is CP Appointment Calendar Plugin up to version 1.1.5 on WordPress.
The vulnerability in CVE-2015-10099 is a SQL injection vulnerability in the function dex_process_ready_to_go_appointment of the file dex_appointments.php of CP Appointment Calendar Plugin.
To fix CVE-2015-10099, it is recommended to update CP Appointment Calendar Plugin to a version higher than 1.1.5 or apply any available patches or security fixes provided by the vendor.
The CWE category of CVE-2015-10099 is CWE-89 (SQL Injection).