cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-6332,https://securityvulnerability.io/vulnerability/CVE-2024-6332,Unauthorized Access to Employee Calendar Details in Amelia Premium and Lite Plugins,"The Booking for Appointments and Events Calendar – Amelia Premium and Lite plugins for WordPress are vulnerable to unauthorized access of data due to a missing capability check on the 'ameliaButtonCommand' function in all versions up to, and including, Premium 7.7 and Lite 1.2.3. This makes it possible for unauthenticated attackers to access employee calendar details, including Google Calendar OAuth tokens in the premium version.",Wordpress,"Booking For Appointments And Events Calendar – Amelia Premium,Booking For Appointments And Events Calendar – Amelia",6.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,2024-09-05T09:29:48.753Z,0 CVE-2024-6552,https://securityvulnerability.io/vulnerability/CVE-2024-6552,Full Path Disclosure Vulnerability in Amelia Booking Plugin for WordPress,"The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2. This is due to the plugin utilizing Symfony and leaving display_errors on within test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.",Wordpress,Booking For Appointments And Events Calendar – Amelia,5.3,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,2024-08-08T03:30:46.182Z,0 CVE-2024-6225,https://securityvulnerability.io/vulnerability/CVE-2024-6225,Stored Cross-Site Scripting Vulnerability Affects Amelia Booking Plugin for WordPress,"The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1.5 (and 7.5.1 for the Pro version) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",Wordpress,Booking For Appointments And Events Calendar – Amelia,4.8,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-06-21T07:39:57.465Z,0 CVE-2024-1484,https://securityvulnerability.io/vulnerability/CVE-2024-1484,Reflected Cross-Site Scripting Vulnerability in Amelia Plugin for WordPress,"The Amelia plugin for WordPress, used for managing bookings for appointments and events, is susceptible to reflected cross-site scripting due to inadequate input sanitization and output escaping. Specifically, attackers can exploit this vulnerability through date parameters, allowing them to inject arbitrary scripts into web pages. If users are deceived into clicking a malicious link, the injected scripts can execute in their browsers, potentially leading to severe security risks, including unauthorized data access or session hijacking.",Wordpress,Booking For Appointments And Events Calendar – Amelia,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-03-13T15:26:44.753Z,0 CVE-2023-6808,https://securityvulnerability.io/vulnerability/CVE-2023-6808,Stored Cross-Site Scripting Vulnerability in Amelia's Booking Plugin,"The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",Wordpress,Booking For Appointments And Events Calendar – Amelia,6.4,MEDIUM,0.0005600000149570405,false,,false,false,false,,false,false,2024-02-05T21:21:57.486Z,0 CVE-2022-0825,https://securityvulnerability.io/vulnerability/CVE-2022-0825,Amelia < 1.0.49 - Customer+ Arbitrary Appointments Status Update,"The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.",Wordpress,Amelia – Events & Appointments Booking Calendar,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-04-04T15:35:49.000Z,0 CVE-2022-0720,https://securityvulnerability.io/vulnerability/CVE-2022-0720,Amelia < 1.0.47 - Customer+ Arbitrary Appointments Update and Sensitive Data Disclosure,"The Amelia WordPress plugin before 1.0.47 does not have proper authorisation when managing appointments, allowing any customer to update other's booking, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.",Wordpress,Amelia – Events & Appointments Booking Calendar,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-03-28T17:23:18.000Z,0 CVE-2022-0834,https://securityvulnerability.io/vulnerability/CVE-2022-0834,Amelia Booking <= 1.0.46 Stored Cross Site Scripting,The Amelia WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the lastName parameter found in the ~/src/Application/Controller/User/Customer/AddCustomerController.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user accesses the booking calendar with the date the attacker has injected the malicious payload into. This affects versions up to and including 1.0.46.,Wordpress,Booking For Appointments And Events Calendar – Amelia,7.2,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2022-03-23T19:46:49.000Z,0 CVE-2022-0687,https://securityvulnerability.io/vulnerability/CVE-2022-0687,Amelia < 1.0.46 - Manager+ RCE,"The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom ""Amelia Manager"" role.",Wordpress,Amelia – Events & Appointments Booking Calendar,8.8,HIGH,0.0011399999493733048,false,,false,false,false,,false,false,2022-03-21T18:55:57.000Z,0 CVE-2022-0627,https://securityvulnerability.io/vulnerability/CVE-2022-0627,Amelia < 1.0.46 - Reflected Cross-Site Scripting,"The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.",Wordpress,Amelia – Events & Appointments Booking Calendar,6.1,MEDIUM,0.0007999999797903001,false,,false,false,false,,false,false,2022-03-21T18:55:51.000Z,0 CVE-2022-0616,https://securityvulnerability.io/vulnerability/CVE-2022-0616,Amelia < 1.0.46 - Arbitrary Customer Deletion via CSRF,"The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack",Wordpress,Amelia – Events & Appointments Booking Calendar,4.3,MEDIUM,0.0006099999882280827,false,,false,false,false,,false,false,2022-03-21T18:55:50.000Z,0