Impact
The WPBookit plugin for WordPress contains a flaw that allows an unauthenticated attacker to store malicious JavaScript code by submitting crafted values for the wpb_user_name and wpb_user_email fields. When a visitor loads a page that displays these fields, the injected script runs in the visitor’s browser, enabling arbitrary client‑side code execution.
Affected Systems
All installations of the WPBookit plugin by iqonicdesign running version 1.0.8 or earlier are affected. The vulnerability does not apply to newer releases of the plugin.
Risk and Exploitability
The flaw has a CVSS base score of 7.2, indicating high severity. The EPSS score is less than 1 %, suggesting a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The attack vector is an unauthenticated submission of crafted wpb_user_name and wpb_user_email values through the booking shortcode or related endpoint; once stored, any user who visits the affected page will trigger the injected payload.
OpenCVE Enrichment