CVE-2025-54676

6.5 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the vcita Online Booking & Scheduling Calendar WordPress plugin allows attackers to inject malicious scripts into web pages that are then executed when other users view those pages. WordPress administrators and users who can access the booking/scheduling functionality are affected. The vulnerability exists in versions up to 4.5.3 of the plugin.

💻 Affected Systems

Products:
  • Online Booking & Scheduling Calendar for WordPress by vcita
Versions: n/a through 4.5.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable versions of this plugin are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as administrators, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies or credentials, potentially gaining administrative access to the WordPress site.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized and rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the ability to interact with the booking/scheduling functionality, which typically requires some level of access to the WordPress site.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.5.3

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-by-vcita-plugin-plugin-4-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Online Booking & Scheduling Calendar for WordPress by vcita'. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily disable the vcita booking plugin until patched

wp plugin deactivate online-booking-scheduling-calendar-for-wordpress-by-vcita

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Online Booking & Scheduling Calendar for WordPress by vcita' version 4.5.3 or earlier

Check Version:

wp plugin get online-booking-scheduling-calendar-for-wordpress-by-vcita --field=version

Verify Fix Applied:

Verify plugin version is higher than 4.5.3 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to booking/scheduling endpoints with script tags or JavaScript payloads
  • Multiple failed attempts to access booking functionality

Network Indicators:

  • HTTP requests containing script tags or JavaScript in booking-related parameters
  • Unusual outbound connections from WordPress site after booking form submissions

SIEM Query:

source="wordpress" AND (uri_path="*booking*" OR uri_path="*scheduling*") AND (http_method="POST") AND (request_body="*<script>*" OR request_body="*javascript:*")

🔗 References

📤 Share & Export