[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMmWu9QNsciZqgnfyaI9Z1GEGLG5KjDKvve6n1hKYTv4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20,"patch_diff_files":21,"patch_trac_url":22},"CVE-2026-1708","appointment-booking-calendar-unauthenticated-sql-injection-via-appendwheresql-parameter","Appointment Booking Calendar \u003C= 1.6.9.27 - Unauthenticated SQL Injection via 'append_where_sql' Parameter","The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted they have obtained a valid `public_token` that is inadvertently exposed during the booking flow.","simply-schedule-appointments",null,"\u003C=1.6.9.27","1.6.9.29","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2026-03-10 19:14:37","2026-03-11 13:37:12",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F71642341-9fe0-44a9-88f3-70167dc6ca62?source=api-prod",1,[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fsimply-schedule-appointments%2Ftags%2F1.6.9.27&new_path=%2Fsimply-schedule-appointments%2Ftags%2F1.6.9.29"]