Stored Cross-Site Scripting in Bookly Plugin for WordPress
CVE-2023-1172

6.1MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
17 March 2023

Summary

The Bookly plugin for WordPress presents a significant security vulnerability due to its failure to properly sanitize input and escape output. This allows unauthenticated attackers to execute arbitrary scripts that can be injected through the 'full name' input field. When users visit affected pages, these scripts are executed, which could lead to unauthorized actions or data theft. Website owners using the vulnerable versions are urged to update to the latest version to mitigate this risk.

Affected Version(s)

WordPress Online Booking and Scheduling Plugin – Bookly 21.5

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Vinay Kumar
.