Sign In Scheduling Online Appointment Booking System Security & Risk Analysis

wordpress.org/plugins/10to8-online-booking

Embed online appointment scheduling from Sign In Scheduling directly into your WordPress site.

800 active installs v1.1.0 PHP + WP 2.5+ Updated Apr 4, 2024
10to8appointment-schedulingbookingonline-bookingscheduling
92
A · Safe
CVEs total1
Unpatched0
Last CVENov 29, 2023
Safety Verdict

Is Sign In Scheduling Online Appointment Booking System Safe to Use in 2026?

Generally Safe

Score 92/100

Sign In Scheduling Online Appointment Booking System has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 29, 2023Updated 2yr ago
Risk Assessment

The static analysis of the '10to8-online-booking' plugin v1.1.0 reveals a generally good security posture concerning direct code vulnerabilities. There are no identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests in the analyzed code. The plugin also demonstrates a lack of critical or high-severity taint flows, suggesting that data handling within the code is likely sanitized. However, the complete absence of nonce checks and capability checks across all entry points is a significant concern. While there are no unprotected AJAX handlers or REST API routes, relying solely on WordPress's default access control without explicit checks in the plugin's own code can leave it vulnerable to various privilege escalation or unauthorized action attacks if an attacker can trick a logged-in user into triggering these actions.

The vulnerability history indicates that the plugin has had one known CVE, specifically a Cross-Site Scripting (XSS) vulnerability, which was patched prior to the current version. The fact that there are no currently unpatched vulnerabilities and that the past vulnerability was of medium severity is a positive sign. However, the presence of a past XSS vulnerability, even if patched, highlights a potential area of weakness. The absence of any capability checks on the identified shortcode is also a point of concern, as shortcodes can be an entry point for user interaction and potential exploitation if not properly secured. While the overall code analysis shows good practices, the lack of explicit security checks on its entry points and the history of an XSS vulnerability warrant careful consideration of potential risks.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
  • Shortcode without explicit capability check
  • Past XSS vulnerability (medium severity)
Vulnerabilities
1

Sign In Scheduling Online Appointment Booking System Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-49173medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

10to8 Online Appointment Booking System <= 1.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode

Nov 29, 2023 Patched in 1.1.0 (821d)
Code Analysis
Analyzed Mar 16, 2026

Sign In Scheduling Online Appointment Booking System Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sign In Scheduling Online Appointment Booking System Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[10to8booking] 10to8-online-appointment-booking.php:47
WordPress Hooks 1
actionwp_enqueue_scripts10to8-online-appointment-booking.php:22
Maintenance & Trust

Sign In Scheduling Online Appointment Booking System Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedApr 4, 2024
PHP min version
Downloads29K

Community Trust

Rating100/100
Number of ratings3
Active installs800
Developer Profile

Sign In Scheduling Online Appointment Booking System Developer Profile

Sign In Scheduling (formerly 10to8)

1 plugin · 800 total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
821 days
View full developer profile
Detection Fingerprints

How We Detect Sign In Scheduling Online Appointment Booking System

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/10to8-online-booking/init.js
Script Paths
https://d3saea0ftg7bjt.cloudfront.net/embed/js/embed.min.js/wp-content/plugins/10to8-online-booking/init.js

HTML / DOM Fingerprints

JS Globals
wordpressZembedConfig
Shortcode Output
<div id="TTE-</div>
FAQ

Frequently Asked Questions about Sign In Scheduling Online Appointment Booking System