Skip to main content

CVE-2025-9851: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gentlesource Appointmind

Medium
VulnerabilityCVE-2025-9851cvecve-2025-9851cwe-79
Published: Wed Sep 17 2025 (09/17/2025, 01:49:15 UTC)
Source: CVE Database V5
Vendor/Project: gentlesource
Product: Appointmind

Description

The Appointmind plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'appointmind_calendar' shortcode in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 09/17/2025, 02:32:56 UTC

Technical Analysis

CVE-2025-9851 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Appointmind plugin for WordPress, developed by gentlesource. This vulnerability affects all versions up to and including 4.1.0. The root cause is insufficient sanitization and output escaping of user-supplied attributes within the 'appointmind_calendar' shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting malicious scripts into pages generated by the plugin. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, privileges at the contributor level, and user interaction (viewing the infected page). The scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights the risk of insufficient input validation in WordPress plugins, which are common targets due to their widespread use and varying security quality.

Potential Impact

For European organizations using WordPress websites with the Appointmind plugin, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in the context of the affected site, enabling attackers to steal session cookies, perform actions on behalf of legitimate users, or spread malware. This can compromise the confidentiality and integrity of user data and damage organizational reputation. Given that contributor-level access is required, the threat is more relevant in environments where multiple users have content creation privileges, such as media companies, educational institutions, or collaborative platforms. The impact is heightened in sectors handling sensitive personal data under GDPR, as a breach could lead to regulatory penalties. Additionally, the scope change in the CVSS vector suggests that the vulnerability could affect other components or users beyond the initial injection point, increasing potential damage. However, the lack of known exploits and the medium severity score indicate that immediate widespread exploitation is less likely but should not be ignored.

Mitigation Recommendations

European organizations should take proactive steps to mitigate this vulnerability: 1) Immediately audit WordPress installations to identify the presence of the Appointmind plugin and verify its version. 2) Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of accounts with such privileges. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'appointmind_calendar' shortcode parameters. 4) Monitor website content and logs for unusual script injections or unexpected changes in pages using the shortcode. 5) Until an official patch is released, consider disabling or removing the Appointmind plugin if it is not critical to operations. 6) Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. 7) Keep WordPress core and all plugins updated regularly and subscribe to security advisories from gentlesource and WordPress security teams to apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-02T15:08:00.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ca1a3d571b2840ff0172f9

Added to database: 9/17/2025, 2:17:33 AM

Last enriched: 9/17/2025, 2:32:56 AM

Last updated: 9/17/2025, 3:31:51 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats