WordPress plugin Smart Appointment & Booking 跨站脚本漏洞

情报来源:CNNVD

发布时间:2026-02-04 00:00:00

基本信息
  • 漏洞ID:
  • 漏洞类型:跨站脚本
  • 发布日期:2026-02-04 00:00:00
  • 更新时间:2026-02-05 00:00:00
  • CVE编号:CVE-2026-0742
  • CNNVD-ID:CNNVD-202602-727
  • 漏洞平台:WordPress
  • CVSS评分:
漏洞来源

暂无

漏洞详情

WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Smart Appointment & Booking 1.0.7及之前版本存在跨站脚本漏洞,该漏洞源于输入清理和输出转义不足,可能导致存储型跨站脚本攻击。

参考资料

来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/smart-appointment-booking/tags/1.0.7/inc/admin/class.saab.admin.action.php#L1203 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/smart-appointment-booking/tags/1.0.7/inc/front/class.saab.front.action.php#L2189 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/smart-appointment-booking/trunk/inc/admin/class.saab.admin.action.php#L1203 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/browser/smart-appointment-booking/trunk/inc/front/class.saab.front.action.php#L2189 来源:plugins.trac.wordpress.org 链接:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3450387%40smart-appointment-booking&new=3450387%40smart-appointment-booking&sfp_email=&sfph_mail= 来源:www.wordfence.com 链接:https://www.wordfence.com/threat-intel/vulnerabilities/id/bf332c0d-5481-412d-b44a-b3de346d7b60?source=cve