CVE-2024-1760

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.6.20. This is due to missing or incorrect nonce validation on the ssa_factory_reset() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*

History

04 Feb 2025, 15:36

Type Values Removed Values Added
First Time Nsquared
Nsquared simply Schedule Appointments
CPE cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*
CWE CWE-352
References () https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527 - () https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527 - Product
References () https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php - () https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve - Third Party Advisory

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527 - () https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-support.php#L527 -
References () https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php - () https://plugins.trac.wordpress.org/changeset/3042890/simply-schedule-appointments/trunk/includes/class-support.php -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=cve -

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) El complemento Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.6.6.20 incluida. Esto se debe a una validación nonce faltante o incorrecta en la función ssa_factory_reset(). Esto hace posible que atacantes no autenticados restablezcan la configuración del complemento mediante una solicitud falsificada, siempre que puedan engañar al administrador del sitio para que realice una acción como hacer clic en un enlace.

06 Mar 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 06:15

Updated : 2025-02-04 15:36


NVD link : CVE-2024-1760

Mitre link : CVE-2024-1760

CVE.ORG link : CVE-2024-1760


JSON object : View

Products Affected

nsquared

  • simply_schedule_appointments
CWE
CWE-352

Cross-Site Request Forgery (CSRF)