Description
A vulnerability was determined in calcom cal.diy up to 4.9.4. Affected by this issue is the function getServerSideProps of the file apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx of the component Generic React API. This manipulation of the argument cancelledBy/rescheduledBy causes information disclosure. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the getServerSideProps function of the Generic React API component in calcom cal.diy, allowing an attacker to manipulate the cancelledBy and rescheduledBy arguments and cause the disclosure of sensitive information. This weakness belongs to the Information Exposure and Improper Access Control categories, and the CVE description states that the exploit is publicly known and can be triggered remotely. The exposed data can include user identifiers or booking details that should remain confidential, potentially compromising both privacy and integrity of the system's data.

Affected Systems

This flaw affects the calcom cal.diy product, specifically versions up to and including 4.9.4. The impacted code resides in apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx within the component hierarchy of the Generic React API. No vendor provides separate downstream updates in this context.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available, which makes it unclear how often the vulnerability is actively targeted. Because the exploit is publicly disclosed and can be launched over the network, the risk of exploitation remains significant for any exposed booking interfaces that accept unauthenticated request contexts. The lack of a KEV listing suggests no confirmed widespread attacks yet, but the remote nature and information exposure warrant proactive mitigation.

Generated by OpenCVE AI on May 24, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade calcom cal.diy to a version newer than 4.9.4 once a vendor patch is released.
  • Implement authentication checks on the getServerSideProps entry point to restrict access to authorized users or services only.
  • Validate or sanitize the cancelledBy and rescheduledBy arguments before using them in server-side rendering to prevent leakage of sensitive data.

Generated by OpenCVE AI on May 24, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in calcom cal.diy up to 4.9.4. Affected by this issue is the function getServerSideProps of the file apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx of the component Generic React API. This manipulation of the argument cancelledBy/rescheduledBy causes information disclosure. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title calcom cal.diy Generic React API bookings-single-view.getServerSideProps.tsx getServerSideProps information disclosure
First Time appeared Calcom
Calcom cal.diy
Weaknesses CWE-200
CWE-284
CPEs cpe:2.3:a:calcom:cal.diy:*:*:*:*:*:*:*:*
Vendors & Products Calcom
Calcom cal.diy
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T02:30:11.039Z

Reserved: 2026-05-23T09:12:41.757Z

Link: CVE-2026-9349

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T06:00:12Z

Weaknesses