Description
Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Appointment appointment allows Upload a Web Shell to a Web Server.This issue affects Appointment: from n/a through <= 3.5.5.
Published: 2026-04-08
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw in the Appointment theme that permits an attacker to upload arbitrary files under the control of the web server. By exploiting this flaw, an attacker can upload a web shell, thereby achieving remote code execution on the server hosting the WordPress site. The weakness is identified as CWE‑352, meaning that request forgery leads to unauthorized actions affecting confidentiality, integrity, and availability.

Affected Systems

The weakness affects all installations of the Appointment theme by priyanshumittal running version 3.5.5 or earlier. Sites that have not upgraded beyond 3.5.5 remain vulnerable.

Risk and Exploitability

The CVSS base score of 9.6 marks this as a high‑severity flaw, while the EPSS score of less than 1% suggests that widespread exploitation is currently unlikely. Nonetheless, when exploited the risk is severe due to the potential for remote code execution. The flaw is not listed in the CISA KEV catalog, but that does not reduce the urgency of remediation. The likely attack vector involves a crafted request from an authenticated or session‑maintaining user that bypasses CSRF protections, allowing arbitrary file upload.

Generated by OpenCVE AI on April 14, 2026 at 16:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Appointment theme (3.5.6 or later) to eliminate the CSRF flaw.
  • If an update is not immediately available, restrict the theme’s file upload capability by removing upload actions from the theme or configuring the web server to block file uploads to the theme’s directories.
  • Add or enforce CSRF tokens on all form submissions that trigger file uploads, ensuring that only legitimate, authenticated requests are accepted.
  • Monitor the web server and upload directories for suspicious files, such as unfamiliar scripts or executables, and investigate any unauthorized uploads promptly.
  • Review access logs for anomalous requests targeting the Upload endpoint and block offending IP addresses or user agents as needed.

Generated by OpenCVE AI on April 14, 2026 at 16:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Priyanshumittal
Priyanshumittal appointment
Wordpress
Wordpress wordpress
Vendors & Products Priyanshumittal
Priyanshumittal appointment
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Appointment appointment allows Upload a Web Shell to a Web Server.This issue affects Appointment: from n/a through <= 3.5.5.
Title WordPress Appointment theme <= 3.5.5 - Cross Site Request Forgery (CSRF) to Arbitrary File Upload vulnerability
Weaknesses CWE-352
References

Subscriptions

Priyanshumittal Appointment
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:02.575Z

Reserved: 2026-04-07T10:57:27.974Z

Link: CVE-2026-39620

cve-icon Vulnrichment

Updated: 2026-04-14T14:13:52.965Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:32.110

Modified: 2026-04-24T18:06:58.907

Link: CVE-2026-39620

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:43:24Z

Weaknesses