Description
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, including usernames, email addresses, and password hashes.
Published: 2026-03-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'fields' parameter in all versions up to 1.6.10.0. The vulnerability arises from insufficient escaping of user‑supplied input and the absence of prepared statements in the existing SQL query. This flaw allows attackers to append arbitrary SQL commands, enabling the extraction of sensitive data such as usernames, email addresses, and password hashes from the database. The weakness is identified as CWE-89, indicating a classic SQL injection scenario.

Affected Systems

All installations of the Appointment Booking Calendar plugin version 1.6.10.0 or earlier are affected. The plugin is distributed under the brand croixhaug:Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin. No specific vendor patch notes are available in the supplied data; the fix is presumed to be included in any release newer than 1.6.10.0.

Risk and Exploitability

The CVSS Base Score for this issue is 7.5, indicating high severity. EPSS data is not available, so the current exploitation probability is uncertain, but the flaw is known to be exploitable by unauthenticated users. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the flaw by sending a crafted request to the 'fields' parameter, causing the plugin to execute injected SQL statements.

Generated by OpenCVE AI on March 19, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Appointment Booking Calendar plugin to a version newer than 1.6.10.0 as released by the vendor or through the WordPress plugin repository.
  • If an update is not immediately available, disable the plugin or remove external access to the 'fields' parameter to prevent injection attempts.
  • Ensure the WordPress core, themes, and all other plugins are updated to their latest secure releases.

Generated by OpenCVE AI on March 19, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Croixhaug
Croixhaug appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
Wordpress
Wordpress wordpress
Vendors & Products Croixhaug
Croixhaug appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, including usernames, email addresses, and password hashes.
Title Appointment Booking Calendar <= 1.6.10.0 - Unauthenticated SQL Injection via 'fields' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:18.552Z

Reserved: 2026-03-06T19:11:49.990Z

Link: CVE-2026-3658

cve-icon Vulnrichment

Updated: 2026-03-19T16:05:17.303Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T12:16:18.807

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-3658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:05Z

Weaknesses