Vulnerability Description
Etoile Web Design Ultimate Appointment Booking & Scheduling WordPress Plugin v1.1.9 and lower does not sanitize the value of the "Appointment_ID" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Etoilewebdesign | Ultimate Appointment Booking \& Scheduling | <= 1.1.9 |
Related Weaknesses (CWE)
References
- https://wordpress.org/plugins/ultimate-appointment-scheduling/ProductThird Party Advisory
- https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ExploitThird Party AdvisoryURL Repurposed
- https://wordpress.org/plugins/ultimate-appointment-scheduling/ProductThird Party Advisory
- https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ExploitThird Party AdvisoryURL Repurposed
FAQ
What is CVE-2020-24313?
CVE-2020-24313 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Etoile Web Design Ultimate Appointment Booking & Scheduling WordPress Plugin v1.1.9 and lower does not sanitize the value of the "Appointment_ID" GET parameter before echoing it back out inside an inp...
How severe is CVE-2020-24313?
CVE-2020-24313 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24313?
Check the references section above for vendor advisories and patch information. Affected products include: Etoilewebdesign Ultimate Appointment Booking \& Scheduling.