CVE-2021-24930
Bookly <= 20.3 - Staff Member Stored Cross-Site Scripting
mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
5.4
CVSS Score
5.4
CVSS Score
medium
Severity
20.3.1
Patched in
806d
Time to patch
Description
The WordPress Online Booking and Scheduling Plugin WordPress plugin before 20.3.1 does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=20.3PublishedNovember 8, 2021
Last updatedJanuary 22, 2024
Affected pluginbookly-responsive-appointment-booking-tool
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.