CVE-2023-1172
Published on: Not Yet Published
Last Modified on: 03/17/2023 03:44:00 PM UTC
Certain versions of WordPress Online Booking And Scheduling Plugin Bookly from Ladela contain the following vulnerability:
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- CVE-2023-1172 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
ladela - WordPress Online Booking and Scheduling Plugin – Bookly version = 21.5
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Bookly <= 21.5 - Unauthenticated Stored Cross-Site Scripting via Name | www.wordfence.com text/html |
![]() |
403 Forbidden | plugins.trac.wordpress.org text/html Inactive LinkNot Archived |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Ladela | WordPress_Online_Booking_and_Scheduling_Plugin__Bookly | = 21.5 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-1172 : The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name valu… twitter.com/i/web/status/1… | 2023-03-17 13:04:22 |
![]() |
CVE-2023-1172 | 2023-03-17 14:38:04 |