CVE-2025-46241

8.2 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Appointment Booking Calendar WordPress plugin allows attackers to trick authenticated administrators into performing unintended SQL injection attacks. This affects WordPress sites using Appointment Booking Calendar versions up to 1.3.92. The vulnerability combines CSRF with SQL injection, potentially allowing data theft or manipulation.

💻 Affected Systems

Products:
  • Appointment Booking Calendar WordPress Plugin
Versions: n/a through 1.3.92
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Administrator authentication is required for the CSRF attack to succeed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal sensitive database information (user credentials, appointment data), modify or delete database contents, or potentially gain administrative access to the WordPress site through SQL injection payloads.

🟠

Likely Case

Attackers would steal appointment data, user information, or inject malicious content into the database by tricking administrators into clicking malicious links while authenticated.

🟢

If Mitigated

With proper CSRF protections and input validation, the SQL injection would be prevented even if CSRF occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link. The SQL injection occurs through the CSRF request.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.93 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/appointment-booking-calendar/vulnerability/wordpress-appointment-booking-calendar-plugin-1-3-92-csrf-to-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Appointment Booking Calendar'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.3.93+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate appointment-booking-calendar

CSRF Protection Implementation

all

Add CSRF tokens to plugin forms via custom code or security plugin

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Use web application firewall (WAF) rules to block SQL injection patterns and suspicious requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Appointment Booking Calendar version. If version is 1.3.92 or lower, you are vulnerable.

Check Version:

wp plugin get appointment-booking-calendar --field=version

Verify Fix Applied:

Verify plugin version is 1.3.93 or higher in WordPress admin panel. Test booking functionality to ensure it works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by successful admin login
  • Unexpected POST requests to plugin endpoints from unusual sources

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) to plugin endpoints
  • Requests with suspicious parameters to /wp-content/plugins/appointment-booking-calendar/

SIEM Query:

source="web_server" AND (uri="*appointment-booking-calendar*" AND (method="POST" OR params="*sql*" OR params="*union*"))

🔗 References

📤 Share & Export