Vulnerability Description
Bookly #1 WordPress Booking Plugin Lite before 14.5 has XSS via a jQuery.ajax request to ng-payment_details_dialog.js.
CVSS Score
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Booking-Wp-Plugin | Bookly | < 14.5 |
Related Weaknesses (CWE)
References
- https://wordpress.org/plugins/bookly-responsive-appointment-booking-tool/#develoRelease NotesThird Party Advisory
- https://www.gubello.me/blog/bookly-blind-stored-xss/ExploitThird Party Advisory
- https://wordpress.org/plugins/bookly-responsive-appointment-booking-tool/#develoRelease NotesThird Party Advisory
- https://www.gubello.me/blog/bookly-blind-stored-xss/ExploitThird Party Advisory
FAQ
What is CVE-2018-6891?
CVE-2018-6891 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Bookly #1 WordPress Booking Plugin Lite before 14.5 has XSS via a jQuery.ajax request to ng-payment_details_dialog.js.
How severe is CVE-2018-6891?
CVE-2018-6891 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6891?
Check the references section above for vendor advisories and patch information. Affected products include: Booking-Wp-Plugin Bookly.