Description
The Tennis Court Bookings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-02-19
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The Tennis Court Bookings plugin for WordPress contains a stored cross‑site scripting flaw that allows any administrator‑level user to insert arbitrary JavaScript into the plugin’s settings or calendar configuration fields. Because the data is saved to the database without sufficient sanitization or escaping, the injected script will run automatically in any browser that renders the affected page. This weakness is classified as CWE‑79.

Affected Systems

WordPress sites that have installed Tennis Court Bookings version 1.2.7 or earlier on a multi‑site network and have the unfiltered_html capability disabled are affected. The flaw can only be used by users with administrator or higher privileges who can access the plugin’s configuration screens.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate severity. The EPSS score is less than 1 %, implying a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. An attacker must possess administrator credentials to insert malicious code; once injected, the payload will execute in the browsers of any user who views the affected page.

Generated by OpenCVE AI on April 15, 2026 at 20:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tennis Court Bookings plugin to version 1.2.8 or later
  • If an upgrade is not immediately possible, limit administrative access to trusted personnel and delete any stored malicious scripts from the plugin’s settings and calendar fields
  • Deploy a web application firewall or security plugin to detect and block XSS payloads targeting WordPress administration pages

Generated by OpenCVE AI on April 15, 2026 at 20:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Renoiriii
Renoiriii tennis Court Bookings
Wordpress
Wordpress wordpress
Vendors & Products Renoiriii
Renoiriii tennis Court Bookings
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Tennis Court Bookings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Tennis Court Bookings <= 1.2.7 - Authenticated (Administrator+) Stored Cross-Site Scripting via Admin Settings and Calendar Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Renoiriii Tennis Court Bookings
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:57.359Z

Reserved: 2026-01-16T15:57:13.170Z

Link: CVE-2026-1044

cve-icon Vulnrichment

Updated: 2026-02-19T21:05:03.184Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:43.173

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:30:13Z

Weaknesses