Description
The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 10.14.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-08-28
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows injection of arbitrary scripts into pages viewed by site users
Action: Immediate Patch
AI Analysis

Impact

The Booking Calendar WordPress plugin contains a stored XSS flaw that permits authenticated users with Administrator‑level privileges to inject arbitrary JavaScript into the plugin’s settings. When a vulnerable page is loaded, the injected script runs in the context of any user who visits that page, providing an attacker with the possibility of session hijacking, credential theft, or defacement. This vulnerability resides in the input handling of the booking settings interface.

Affected Systems

The flaw affects all versions of the Booking Calendar plugin by wpdevelop up to and including 10.14.1. Site owners running any of those releases on WordPress require remediation.

Risk and Exploitability

The CVSS base score is 6.4, indicating a medium‑to‑high risk. The EPSS score of less than 1 % indicates that the probability of exploitation in the wild is low. Because the flaw requires authenticated access, the attack vector is limited to users who can log in with Administrator or higher level roles. Even though the vulnerability is not listed in the CISA KEV catalog, it remains a significant threat to sites that rely on this plugin because of its potential to impact many visitors.

Generated by OpenCVE AI on April 20, 2026 at 19:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Booking Calendar plugin to the latest version that addresses the stored XSS vulnerability (any release beyond 10.14.1).
  • If an immediate upgrade is not possible, restrict access to the plugin settings and options to administrator and super administrator roles, and consider disabling the plugin until a patch is applied.
  • Use a web application firewall such as Wordfence to block potential XSS payloads and monitor for suspicious input in the plugin’s configuration pages.

Generated by OpenCVE AI on April 20, 2026 at 19:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25957 The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 10.14.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 28 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 04:00:00 +0000

Type Values Removed Values Added
Description The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 10.14.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Booking Calendar <= 10.14.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:22:06.525Z

Reserved: 2025-08-22T14:17:13.254Z

Link: CVE-2025-9346

cve-icon Vulnrichment

Updated: 2025-08-28T13:37:07.690Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T04:16:04.717

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:00:10Z

Weaknesses