Appointment Booking Calendar <= 1.6.10.6 - Unauthenticated Arbitrary Appointment View, Modification and Deletion
Summary
| CVE | CVE-2026-4807 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-07 03:16:08 UTC |
| Updated | 2026-05-07 03:16:08 UTC |
| Description | The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.6.10.6. This is due to a flawed authorization logic in the nonce_permissions_check() method combined with the public exposure of a site-wide reusable nonce. The plugin exposes a public_nonce value through the /wp-json/ssa/v1/embed-inner endpoint, which is accessible to unauthenticated users. The appointment deletion endpoint at /wp-json/ssa/v1/appointments/{id}/delete and /wp-json/ssa/v1/appointments/bulk use a permission check that accepts requests containing both an X-WP-Nonce header (with any arbitrary value) and an X-PUBLIC-Nonce header (with the valid public nonce). When the X-WP-Nonce validation fails, the function falls back to validating the X-PUBLIC-Nonce without properly rejecting the request. Since the public_nonce is exposed to all unauthenticated visitors and is site-wide (not user-specific or appointment-specific), attackers can obtain it and use it to view details of arbitrary appointments, including the public_edit_url, or delete arbitrary appointments by ID. This makes it possible for unauthenticated attackers to view, delete or modify any appointment in the system, disclosing sensitive appointment data, causing service disruption, and loss of booking records. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Problem Types: CWE-862 | CWE-862 CWE-862 Missing Authorization
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
| 3.1 | CNA | DECLARED | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
LowAvailability
LowCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Croixhaug | Appointment Booking Calendar Simply Schedule Appointments Booking Plugin | affected 1.6.10.6 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/booking-ap... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/changeset/3511993/simply-schedule-appointments/trunk/includes | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/includes/l... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/includes/c... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/includes/c... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/includes/c... | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/simply-schedule-appointments/tags/1.6.9.29/includes/l... | [email protected] | plugins.trac.wordpress.org | |
| www.wordfence.com/threat-intel/vulnerabilities/id/436ab843-7729-4d57-9c9e-2ede2... | [email protected] | www.wordfence.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Athiwat Tiprasaharn (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-03-25T12:43:44.000Z | Vendor Notified |
| CNA | 2026-05-06T13:33:55.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.