Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScript or HTML.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html | Exploit Third Party Advisory VDB Entry |
https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 | Exploit Third Party Advisory |
https://wordpress.org/plugins/appointment-booking-calendar/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/10110 | Third Party Advisory |
https://www.hotdreamweaver.com/support/view.php?id=815925 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-03-04 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2020-9371
Mitre link : CVE-2020-9371
CVE.ORG link : CVE-2020-9371
JSON object : View
Products Affected
codepeople
- appointment_booking_calendar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')