Blind SQL Injection Vulnerability in Simply Schedule Appointments Booking Plugin for WordPress
CVE-2026-1708

7.5HIGH

What is CVE-2026-1708?

The Simply Schedule Appointments Booking Plugin for WordPress is susceptible to blind SQL injection in versions up to 1.6.9.27. This vulnerability arises from the inadequate handling of the append_where_sql parameter in JSON request bodies, as it is only validated against the $_REQUEST superglobal. Unauthenticated attackers can exploit this flaw to inject arbitrary SQL commands into database queries, potentially leading to unauthorized access to sensitive information. This is facilitated by the accidental exposure of a public_token during the booking process, which allows attackers to circumvent security measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Appointment Booking Calendar β€” Simply Schedule Appointments Booking Plugin * <= 1.6.9.27

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Thanh Hao
.