Skip to main content

CVE-2024-9882: CWE-79 Cross-Site Scripting (XSS) in Unknown Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses

Medium
VulnerabilityCVE-2024-9882cvecve-2024-9882cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:24 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses

Description

The Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses WordPress plugin before 1.9.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 15:57:04 UTC

Technical Analysis

CVE-2024-9882 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin "Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses" prior to version 1.9.4. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts (Stored XSS) within the plugin's settings. Notably, this exploitation is possible even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML content. The attack requires high privilege and user interaction (an admin must perform the injection), but once exploited, the malicious script can execute in the context of other administrators or users accessing the affected settings pages. This can lead to theft of authentication tokens, session hijacking, or unauthorized actions performed with elevated privileges. The CVSS 3.1 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and partial confidentiality and integrity impact without availability impact. There are no known public exploits in the wild yet, and no official patches have been linked, but the vulnerability is publicly disclosed and should be addressed promptly by upgrading to version 1.9.4 or later once available.

Potential Impact

For European organizations, especially those operating salons, spas, or small businesses using WordPress with this plugin, the vulnerability poses a risk of administrative account compromise and unauthorized control over booking and scheduling data. The Stored XSS can be leveraged to execute malicious scripts that steal session cookies or perform unauthorized administrative actions, potentially leading to data leakage or manipulation of customer appointments and business operations. Given the administrative privileges required, the threat is more internal or targeted at compromised admin accounts rather than broad external exploitation. However, in multisite WordPress setups common in larger organizations or managed hosting environments, the risk is amplified because the usual safeguards (like unfiltered_html restrictions) do not prevent exploitation. This could impact confidentiality and integrity of business data and customer information, possibly leading to reputational damage and regulatory compliance issues under GDPR if personal data is exposed or altered.

Mitigation Recommendations

1. Immediately upgrade the Salon Booking System plugin to version 1.9.4 or later once the patch is released to ensure proper sanitization and escaping of settings inputs. 2. Until a patch is available, restrict administrative access strictly to trusted personnel and monitor admin activities for suspicious behavior. 3. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script execution sources. 4. Regularly audit and sanitize all plugin settings and inputs manually if possible, removing any suspicious or unexpected content. 5. Use security plugins that detect and block XSS payloads or anomalous admin interface behavior. 6. In multisite environments, review and tighten capability assignments to limit the number of users with high privileges. 7. Educate administrators on the risks of injecting untrusted content and encourage use of secure password and multi-factor authentication to reduce risk of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-11T18:34:52.655Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb929

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:57:04 PM

Last updated: 8/17/2025, 9:52:41 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats