Booking-wp-plugin

Bookly

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 27.11.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:41:18

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfil...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 16.10.2023 20:15:16
  • Zuletzt bearbeitet 23.04.2025 17:16:46

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

  • EPSS 0.16%
  • Veröffentlicht 02.06.2023 07:15:08
  • Zuletzt bearbeitet 21.11.2024 07:38:34

The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via service titles in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with...

  • EPSS 0.84%
  • Veröffentlicht 17.03.2023 13:15:10
  • Zuletzt bearbeitet 21.11.2024 07:38:36

The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacke...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 06.12.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:54:01

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 20.3.1 does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue

Exploit
  • EPSS 0.21%
  • Veröffentlicht 11.02.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:22

Bookly #1 WordPress Booking Plugin Lite before 14.5 has XSS via a jQuery.ajax request to ng-payment_details_dialog.js.