Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScript or HTML.
References
Configurations
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/appointment-booking-calendar/#developers - Release Notes, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/10110 - Third Party Advisory | |
References | () https://www.hotdreamweaver.com/support/view.php?id=815925 - Permissions Required, Third Party Advisory |
Information
Published : 2020-03-04 19:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9371
Mitre link : CVE-2020-9371
CVE.ORG link : CVE-2020-9371
JSON object : View
Products Affected
codepeople
- appointment_booking_calendar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')