First published: Wed Mar 06 2024(Updated: )
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.6.20. This is due to missing or incorrect nonce validation on the ssa_factory_reset() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simply Schedule Appointments | <1.6.6.24 | |
Simply Schedule Appointments | <=1.6.6.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1760 is classified as a Cross-Site Request Forgery (CSRF) vulnerability, posing moderate risk due to missing nonce validation.
To fix CVE-2024-1760, update the Simply Schedule Appointments Booking Plugin to version 1.6.6.21 or later.
CVE-2024-1760 affects all versions of Simply Schedule Appointments up to and including 1.6.6.20.
Cross-Site Request Forgery in CVE-2024-1760 allows attackers to execute unauthorized actions on behalf of authenticated users due to inadequate validation.
As of now, there are no publicly disclosed exploits for CVE-2024-1760, but it is important to address the vulnerability promptly for security.