First published: Fri Mar 07 2025(Updated: )
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the accent_color and background parameter in all versions up to, and including, 1.6.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simply Schedule Appointments | <=1.6.8.3 | |
Nsquared Appointment Booking Calendar | <1.6.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13431 has been classified as a medium severity vulnerability due to its potential to allow reflected cross-site scripting attacks.
To fix CVE-2024-13431, update the Simply Schedule Appointments Booking Plugin to version 1.6.8.4 or later.
CVE-2024-13431 affects all versions of the Simply Schedule Appointments Booking Plugin up to and including 1.6.8.3.
CVE-2024-13431 is a reflected cross-site scripting (XSS) vulnerability.
The accent_color and background parameters are involved in the CVE-2024-13431 vulnerability.