First published: Thu Mar 13 2025(Updated: )
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simply Schedule Appointments | <=1.6.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1119 is rated as a high severity vulnerability due to the potential for arbitrary shortcode execution.
To fix CVE-2025-1119, update the Simply Schedule Appointments Booking Plugin to version 1.6.8.6 or later.
CVE-2025-1119 affects all versions of the Simply Schedule Appointments Booking Plugin up to and including 1.6.8.5.
CVE-2025-1119 can allow attackers to execute arbitrary shortcodes, potentially compromising the security of your WordPress site.
Users of the Simply Schedule Appointments Booking Plugin on WordPress who have versions up to 1.6.8.5 are impacted by CVE-2025-1119.