Vulnerability Description
Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScript or HTML.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Codepeople | Appointment Booking Calendar | < 1.3.35 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-CalendExploitThird Party AdvisoryVDB Entry
- https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9ExploitThird Party Advisory
- https://wordpress.org/plugins/appointment-booking-calendar/#developersRelease NotesThird Party Advisory
- https://wpvulndb.com/vulnerabilities/10110Third Party Advisory
- https://www.hotdreamweaver.com/support/view.php?id=815925Permissions RequiredThird Party Advisory
- http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-CalendExploitThird Party AdvisoryVDB Entry
- https://drive.google.com/open?id=1NNcYPaJir9SleyVr4cSPqpI2LNM7rtx9ExploitThird Party Advisory
- https://wordpress.org/plugins/appointment-booking-calendar/#developersRelease NotesThird Party Advisory
- https://wpvulndb.com/vulnerabilities/10110Third Party Advisory
- https://www.hotdreamweaver.com/support/view.php?id=815925Permissions RequiredThird Party Advisory
FAQ
What is CVE-2020-9371?
CVE-2020-9371 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScri...
How severe is CVE-2020-9371?
CVE-2020-9371 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9371?
Check the references section above for vendor advisories and patch information. Affected products include: Codepeople Appointment Booking Calendar.