CVE-2025-12804: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevelop Booking Calendar
The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin 'bookingcalendar' shortcode in all versions up to, and including, 10.14.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12804 is a stored Cross-Site Scripting vulnerability identified in the Booking Calendar plugin for WordPress, developed by wpdevelop. The vulnerability exists in all versions up to and including 10.14.6 due to improper neutralization of user-supplied input within the plugin's shortcode implementation. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level permissions or higher. This flaw allows these users to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who views the affected page. The vulnerability leverages CWE-79, which relates to improper input validation during web page generation. The CVSS v3.1 base score is 6.4, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss, such as session token theft, unauthorized actions on behalf of users, or defacement. No public exploits have been reported yet, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors. The vulnerability was published on December 5, 2025, and no official patch links are currently available. The plugin's widespread use in managing booking and scheduling on WordPress sites makes this a notable threat vector.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user sessions, stealing sensitive data, or enabling further attacks such as privilege escalation or phishing. Organizations relying on the Booking Calendar plugin for customer-facing booking services may face reputational damage, service disruption, or data breaches. Since the exploit requires contributor-level access, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. The scope of impact includes any user visiting the infected pages, which may include customers, employees, or administrators. Given the widespread use of WordPress in Europe and the popularity of booking plugins for SMEs and service providers, the risk is significant. The vulnerability could also be used as a foothold for more advanced attacks within the network if combined with other vulnerabilities or social engineering. The medium severity rating reflects the balance between required privileges and the potential impact on confidentiality and integrity.
Mitigation Recommendations
1. Monitor for and apply updates from wpdevelop promptly once a patch addressing CVE-2025-12804 is released. 2. Until a patch is available, restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 3. Implement strict input validation and output encoding at the application or web server level, potentially using custom filters or security plugins that sanitize shortcode inputs. 4. Deploy a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting WordPress shortcodes. 5. Conduct regular security audits and scanning of WordPress plugins to detect injection points. 6. Educate contributors about the risks of injecting untrusted content and enforce secure content management policies. 7. Consider disabling the Booking Calendar plugin temporarily if it is not critical or if risk tolerance is low. 8. Monitor logs for unusual activity related to shortcode usage or script injections. 9. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 10. Backup WordPress sites regularly to enable quick restoration if compromise occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12804: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevelop Booking Calendar
Description
The Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin 'bookingcalendar' shortcode in all versions up to, and including, 10.14.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-12804 is a stored Cross-Site Scripting vulnerability identified in the Booking Calendar plugin for WordPress, developed by wpdevelop. The vulnerability exists in all versions up to and including 10.14.6 due to improper neutralization of user-supplied input within the plugin's shortcode implementation. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level permissions or higher. This flaw allows these users to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who views the affected page. The vulnerability leverages CWE-79, which relates to improper input validation during web page generation. The CVSS v3.1 base score is 6.4, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss, such as session token theft, unauthorized actions on behalf of users, or defacement. No public exploits have been reported yet, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors. The vulnerability was published on December 5, 2025, and no official patch links are currently available. The plugin's widespread use in managing booking and scheduling on WordPress sites makes this a notable threat vector.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user sessions, stealing sensitive data, or enabling further attacks such as privilege escalation or phishing. Organizations relying on the Booking Calendar plugin for customer-facing booking services may face reputational damage, service disruption, or data breaches. Since the exploit requires contributor-level access, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. The scope of impact includes any user visiting the infected pages, which may include customers, employees, or administrators. Given the widespread use of WordPress in Europe and the popularity of booking plugins for SMEs and service providers, the risk is significant. The vulnerability could also be used as a foothold for more advanced attacks within the network if combined with other vulnerabilities or social engineering. The medium severity rating reflects the balance between required privileges and the potential impact on confidentiality and integrity.
Mitigation Recommendations
1. Monitor for and apply updates from wpdevelop promptly once a patch addressing CVE-2025-12804 is released. 2. Until a patch is available, restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 3. Implement strict input validation and output encoding at the application or web server level, potentially using custom filters or security plugins that sanitize shortcode inputs. 4. Deploy a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting WordPress shortcodes. 5. Conduct regular security audits and scanning of WordPress plugins to detect injection points. 6. Educate contributors about the risks of injecting untrusted content and enforce secure content management policies. 7. Consider disabling the Booking Calendar plugin temporarily if it is not critical or if risk tolerance is low. 8. Monitor logs for unusual activity related to shortcode usage or script injections. 9. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 10. Backup WordPress sites regularly to enable quick restoration if compromise occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T13:45:29.328Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6932441b10edf2688fd42d76
Added to database: 12/5/2025, 2:31:55 AM
Last enriched: 12/12/2025, 5:04:57 AM
Last updated: 1/19/2026, 12:39:40 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumCVE-2025-15539: Denial of Service in Open5GS
MediumCVE-2026-23733: CWE-94: Improper Control of Generation of Code ('Code Injection') in lobehub lobe-chat
MediumCVE-2025-15538: Use After Free in Open Asset Import Library Assimp
MediumCVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.