CVE-2025-11723
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.5 - Unauthenticated Sensitive Information Exposure
mediumUse of Insufficiently Random Values
6.5
CVSS Score
6.5
CVSS Score
medium
Severity
1.6.9.6
Patched in
1d
Time to patch
Description
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.9.5 via the hash() function due to use of a hardcoded fall-back salt. This makes it possible for unauthenticated attackers to generate a valid token across sites running the plugin that have not manually set a salt in the wp-config.php file and access booking information that will allow them to make modifications.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Low
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=1.6.9.5PublishedJanuary 5, 2026
Last updatedJanuary 6, 2026
Affected pluginsimply-schedule-appointments
What Changed in the Fix
Changes introduced in v1.6.9.6
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.