Blind SQL Injection Vulnerability in Simply Schedule Appointments Booking Plugin for WordPress
CVE-2026-1708
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 11 March 2026
What is CVE-2026-1708?
The Simply Schedule Appointments Booking Plugin for WordPress is susceptible to blind SQL injection in versions up to 1.6.9.27. This vulnerability arises from the inadequate handling of the append_where_sql parameter in JSON request bodies, as it is only validated against the $_REQUEST superglobal. Unauthenticated attackers can exploit this flaw to inject arbitrary SQL commands into database queries, potentially leading to unauthorized access to sensitive information. This is facilitated by the accidental exposure of a public_token during the booking process, which allows attackers to circumvent security measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Appointment Booking Calendar β Simply Schedule Appointments Booking Plugin * <= 1.6.9.27
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved