Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 28 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codepeople
Codepeople appointment Booking Calendar Wordpress Wordpress wordpress |
|
| Vendors & Products |
Codepeople
Codepeople appointment Booking Calendar Wordpress Wordpress wordpress |
Wed, 28 Jan 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form field configuration parameters in all versions up to, and including, 1.5.60 due to insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' field configuration values. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the form builder interface. This only affects multi-site installations and installations where unfiltered_html has been disabled. | |
| Title | Appointment Hour Booking – Booking Calendar <= 1.5.60 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'Min/Max Length' Field Configuration | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-28T20:51:03.404Z
Reserved: 2026-01-16T20:43:09.863Z
Link: CVE-2026-1083
Updated: 2026-01-28T20:50:58.738Z
Status : Received
Published: 2026-01-28T06:15:49.150
Modified: 2026-01-28T06:15:49.150
Link: CVE-2026-1083
No data.
OpenCVE Enrichment
Updated: 2026-01-28T12:21:41Z