Appointmind Security & Risk Analysis

wordpress.org/plugins/appointmind

Include your Appointmind or Schedule Organizer online appointment scheduling calender in any article or in the sidebar.

100 active installs v4.1.0 PHP + WP 2.5+ Updated Dec 8, 2025
appointmentappointment-schedulerappointment-schedulingappointmentsappointmind
98
A · Safe
CVEs total2
Unpatched0
Last CVESep 16, 2025
Safety Verdict

Is Appointmind Safe to Use in 2026?

Generally Safe

Score 98/100

Appointmind has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Sep 16, 2025Updated 3mo ago
Risk Assessment

The plugin 'appointmind' v4.1.0 presents a mixed security posture. On the positive side, the static analysis reveals a clean slate regarding dangerous functions, SQL injection (100% prepared statements), file operations, and external HTTP requests. Furthermore, there are no AJAX handlers or REST API routes exposed without authentication, and a minimal attack surface of only two shortcodes. This indicates good foundational security practices.

However, several concerns emerge. A significant portion of output (41%) is not properly escaped, creating a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. Alarmingly, the taint analysis shows two flows with unsanitized paths, although these are not flagged as critical or high severity. The complete lack of nonce checks and capability checks on the identified entry points (shortcodes) is a major weakness. The plugin's vulnerability history is also a cause for concern, with two past medium-severity CVEs, one of which was a Cross-Site Request Forgery (CSRF) and the other related to Cross-Site Scripting. The fact that the last vulnerability was relatively recent (2025-09-16) suggests a recurring pattern of security issues.

In conclusion, while 'appointmind' demonstrates strengths in preventing common attack vectors like SQL injection and unauthorized access to its endpoints, the prevalent unescaped output and the complete absence of nonce and capability checks on its shortcodes represent significant risks. The past vulnerability history, particularly involving XSS and CSRF, further amplifies these concerns. Users should be aware of the potential for XSS due to insufficient output escaping and CSRF or unintended execution via shortcodes due to missing checks.

Key Concerns

  • Significant portion of output unescaped
  • Taint flows with unsanitized paths
  • No nonce checks on entry points
  • No capability checks on entry points
  • Past medium severity vulnerabilities (2)
Vulnerabilities
2

Appointmind Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-9851medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Appointmind <= 4.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 16, 2025 Patched in 4.2.0 (4d)
CVE-2024-51679medium · 6.1Cross-Site Request Forgery (CSRF)

Appointmind <= 4.0.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Nov 1, 2024 Patched in 4.1.0 (6d)
Code Analysis
Analyzed Mar 16, 2026

Appointmind Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
26
38 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

59% escaped64 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
editGeneralSettings (settings.php:63)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Appointmind Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[appointmind_calendar] appointmind.php:38
[appointmind_patient_order] appointmind.php:39
WordPress Hooks 6
filterthe_contentappointmind.php:40
actionwidgets_initappointmind.php:41
actioninitappointmind.php:42
actioninitappointmind.php:43
actionwp_footerappointmind.php:44
actionadmin_menuappointmind.php:47
Maintenance & Trust

Appointmind Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Appointmind Developer Profile

gentlesource

2 plugins · 110 total installs

94
trust score
Avg Security Score
92/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Appointmind

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/appointmind/templates/article_calendar.php/wp-content/plugins/appointmind/templates/article_order_form.php/wp-content/plugins/appointmind/templates/footer_code.php

HTML / DOM Fingerprints

Data Attributes
data-appointmind-domaindata-appointmind-pathdata-appointmind-url
Shortcode Output
[appointmind_calendar][appointmind_patient_order]
FAQ

Frequently Asked Questions about Appointmind