2024-11-05 07:03:20 +00:00
{
"id" : "CVE-2024-7877" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2024-11-05T06:15:05.990" ,
2024-11-06 17:03:24 +00:00
"lastModified" : "2024-11-06T15:42:19.343" ,
"vulnStatus" : "Analyzed" ,
2024-11-05 07:03:20 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.55 does not sanitise and escape some of its Notification settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
2024-11-06 17:03:24 +00:00
} ,
{
"lang" : "es" ,
"value" : " El complemento de WordPress Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin anterior a la versi\u00f3n 1.6.7.55 no desinfecta ni omite algunas de sus configuraciones de notificaci\u00f3n, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido"
2024-11-05 07:03:20 +00:00
}
] ,
2024-11-05 17:03:22 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-11-06 17:03:24 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM" ,
2024-11-06 17:03:24 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-11-06 17:03:24 +00:00
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
} ,
2024-11-05 17:03:22 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM" ,
2024-11-05 17:03:22 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-11-05 17:03:22 +00:00
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
}
]
} ,
2024-11-06 17:03:24 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "1.6.7.55" ,
"matchCriteriaId" : "F6019A59-B763-431F-BBB7-3990AE76719B"
}
]
}
]
}
] ,
2024-11-05 07:03:20 +00:00
"references" : [
{
"url" : "https://wpscan.com/vulnerability/fbec3738-2135-458d-be25-1ffb00e6deb6/" ,
2024-11-06 17:03:24 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-11-05 07:03:20 +00:00
}
]
}