First published: Thu May 16 2024(Updated: )
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in versions up to, and including, 1.6.7.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simply Schedule Appointments | <1.6.7.18 | |
Simply Schedule Appointments | <=1.6.7.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4288 has a moderate severity level as it allows for stored cross-site scripting due to insufficient input sanitization.
To fix CVE-2024-4288, update the Simply Schedule Appointments Booking Plugin to version 1.6.7.15 or later.
CVE-2024-4288 affects Simply Schedule Appointments plugin versions up to and including 1.6.7.14.
CVE-2024-4288 can facilitate stored cross-site scripting attacks that can affect the users of the affected WordPress site.
Yes, CVE-2024-4288 is a concern due to its insufficient input sanitization and output escaping for the 'link' parameter.