CVE-2024-7876

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.55 does not sanitise and escape some of its Appointment Type settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*

History

06 Nov 2024, 15:42

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fffe862f-5bf0-4a05-9d32-caff0bfdb860/ - () https://wpscan.com/vulnerability/fffe862f-5bf0-4a05-9d32-caff0bfdb860/ - Exploit, Third Party Advisory
First Time Nsqua simply Schedule Appointments
Nsqua
CWE CWE-79
CPE cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*
Summary
  • (es) El complemento de WordPress Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin anterior a la versión 1.6.7.55 no desinfecta ni escapa de algunas de sus configuraciones de tipo de cita, lo que podría permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross Site Scripting incluso cuando unfiltered_html no está permitido

05 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8

05 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 06:15

Updated : 2024-11-06 15:42


NVD link : CVE-2024-7876

Mitre link : CVE-2024-7876

CVE.ORG link : CVE-2024-7876


JSON object : View

Products Affected

nsqua

  • simply_schedule_appointments
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')