Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScript or HTML.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wordpress.org/plugins/appointment-booking-calendar/#developers | third party advisory release notes |
https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9 | third party advisory exploit |
https://www.hotdreamweaver.com/support/view.php?id=815925 | third party advisory permissions required |
https://wpvulndb.com/vulnerabilities/10110 | third party advisory |
http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html | exploit vdb entry third party advisory |