Description
The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-26
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting that allows arbitrary script execution on visitor browsers
Action: Immediate Patch
AI Analysis

Impact

The Fluent Booking plugin is susceptible to stored cross‑site scripting via multiple input fields that fail to sanitize or escape user content. This flaw permits an unauthenticated attacker to embed malicious scripts, which will be rendered and executed when any visitor loads the affected page. The weakness aligns with CWE‑79 and can compromise confidentiality, integrity, or availability by enabling session hijacking, phishing, or data exfiltration, as the injected code runs with the permissions of the visiting user.

Affected Systems

Vendors: TechJewel. Product: Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution. All installed versions up to and including 2.0.01 are affected. Users running WordPress sites with this plugin should verify their version and apply updates accordingly.

Risk and Exploitability

The CVSS base score of 7.2 indicates a medium‑to‑high severity. The flaw is exploitable without authentication and can be triggered by any user who submits data to the vulnerable parameters, making it widely accessible. While EPSS data is unavailable, the nature of stored XSS coupled with its remote impact suggests a high likelihood of exploitation in practice. The vulnerability is not currently listed the CISA KEV catalog, but operators should treat it as a serious risk.

Generated by OpenCVE AI on March 26, 2026 at 15:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Fluent Booking plugin to the latest available version (≥2.0.02).
  • If an update is not yet released, disable the plugin or the affected functions until a patch is available.
  • Inspect the site for any injected malicious scripts and remove them promptly.
  • Implement a web application firewall or use a security plugin that filters and sanitizes user input to mitigate similar risks.

Generated by OpenCVE AI on March 26, 2026 at 15:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Techjewel
Techjewel fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
Wordpress
Wordpress wordpress
Vendors & Products Techjewel
Techjewel fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
Wordpress
Wordpress wordpress

Thu, 26 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Fluent Booking <= 2.0.01 - Unauthenticated Stored Cross-Site Scripting via Multiple Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:19.413Z

Reserved: 2026-02-08T20:23:42.165Z

Link: CVE-2026-2231

cve-icon Vulnrichment

Updated: 2026-03-26T16:09:19.631Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T14:16:09.670

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-2231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:26:46Z

Weaknesses