cve/2024/CVE-2024-7876.md

20 lines
1.0 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-7876](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7876)
![](https://img.shields.io/static/v1?label=Product&message=Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.55 does not sanitise and escape some of its Appointment Type settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
### POC
#### Reference
- https://wpscan.com/vulnerability/fffe862f-5bf0-4a05-9d32-caff0bfdb860/
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00