CVE-2020-9372

The Appointment Booking Calendar plugin before 1.3.35 for WordPress allows user input (in fields such as Description or Name) in any booking form to be any formula, which then could be exported via the Bookings list tab in /wp-admin/admin.php?page=cpabc_appointments.php. The attacker could achieve remote code execution via CSV injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:codepeople:appointment_booking_calendar:*:*:*:*:*:wordpress:*:*

History

01 Jan 2022, 19:35

Type Values Removed Values Added
CWE CWE-74 CWE-1236
References (MISC) https://wordpress.org/plugins/appointment-booking-calendar/#developers - Release Notes (MISC) https://wordpress.org/plugins/appointment-booking-calendar/#developers - Release Notes, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html - (MISC) http://packetstormsecurity.com/files/156694/WordPress-Appointment-Booking-Calendar-1.3.34-CSV-Injection.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2020-03-04 19:15

Updated : 2023-12-10 13:13


NVD link : CVE-2020-9372

Mitre link : CVE-2020-9372

CVE.ORG link : CVE-2020-9372


JSON object : View

Products Affected

codepeople

  • appointment_booking_calendar
CWE
CWE-1236

Improper Neutralization of Formula Elements in a CSV File