Vulnerabilities and security researches forwp-base-booking-of-appointments-services-and-events wp-base-booking-of-appointments-services-and-events
Direction: descendingFeb 28, 2025
WP BASE Booking of Appointments, Services and Events # CVE-2024-12737
- CVE, Research URL
- Date
- Feb 26, 2025
- Research Description
- The WP BASE Booking of Appointments, Services and Events WordPress plugin before 5.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
- Affected versions
-
max 5.0.0.
- Status
-
vulnerable
Feb 04, 2025
WP BASE Booking of Appointments, Services and Events # CVE-2025-22684
- CVE, Research URL
- Date
- Feb 03, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hakan Ozevin WP BASE Booking allows Stored XSS. This issue affects WP BASE Booking: from n/a through 5.0.0.
- Affected versions
-
max 5.1.0.
- Status
-
vulnerable
Dec 23, 2024
WP BASE Booking of Appointments, Services and Events # CVE-2024-12558
- CVE, Research URL
- Date
- Dec 21, 2024
- Research Description
- The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.
- Affected versions
-
max 5.0.0.
- Status
-
vulnerable
Dec 18, 2024
WP BASE Booking of Appointments, Services and Events # CVE-2024-12469
- CVE, Research URL
- Date
- Dec 17, 2024
- Research Description
- The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘status’ parameter in all versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
max 4.9.2.
- Status
-
vulnerable