Description
The Vagaro Booking Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vagaro_code’ parameter in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vagaro_booking_widget plugin for WordPress suffers from a stored cross‑site scripting flaw. An attacker can supply a malicious payload in the vagaro_code parameter, which the plugin fails to sanitise and escape before saving. The payload is persistently stored and later executed whenever any user views a page that includes the plugin’s output, giving the attacker the ability to run arbitrary JavaScript in the victim’s browser. This can lead to theft of session cookies, defacement, or other client‑side attacks.

Affected Systems

All deployments of the Vagaro Booking Widget plugin for WordPress, up to and including release 0.3, are affected. Any WordPress site that has installed one of these versions, especially those that expose the vagaro_code field to unauthenticated users or allow public editing of plugin settings, is vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.2, indicating significant severity. Because the attack does not require authentication and only needs the plugin to be installed, it is highly exploitable in practice. No EPSS score is available and the issue is not listed in the CISA KEV catalog, but the stored XSS nature makes it a high‑risk vector for compromising site visitors. Both the scope and impact remain contained to the affected site and its users; however, any attacker who can deliver a payload could steal credentials or hijack sessions for that site’s audience.

Generated by OpenCVE AI on March 21, 2026 at 06:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Vagaro Booking Widget to a version newer than 0.3, if available.
  • If an update is not available, remove or disable the plugin until a patch is issued.
  • Review and restrict access to the vagaro_code field so that only trusted administrators can modify it, and validate any input to escape malicious HTML characters.

Generated by OpenCVE AI on March 21, 2026 at 06:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Vagaro
Vagaro vagaro Booking Widget
Wordpress
Wordpress wordpress
Vendors & Products Vagaro
Vagaro vagaro Booking Widget
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Vagaro Booking Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vagaro_code’ parameter in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Vagaro Booking Widget <= 0.3 - Unauthenticated Stored Cross-Site Scripting via 'vagaro_code'
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Vagaro Vagaro Booking Widget
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:19.050Z

Reserved: 2026-02-23T04:28:42.702Z

Link: CVE-2026-3003

cve-icon Vulnrichment

Updated: 2026-03-24T13:49:15.962Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:17:18.623

Modified: 2026-04-24T16:27:44.277

Link: CVE-2026-3003

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:01Z

Weaknesses