Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codepeople Appointment Hour Booking – Booking Calendar

0
Medium
VulnerabilityCVE-2026-1083cvecve-2026-1083cwe-79
Published: Wed Jan 28 2026 (01/28/2026, 05:30:19 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: Appointment Hour Booking – Booking Calendar

Description

CVE-2026-1083 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability in the Appointment Hour Booking – Booking Calendar WordPress plugin affecting all versions up to 1. 5. 60. The flaw arises from insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' form configuration fields. Exploitation requires authenticated users with administrator-level privileges or higher and only affects multi-site WordPress installations or those with unfiltered_html disabled. Successful exploitation allows injection of arbitrary scripts that execute when users access the form builder interface, potentially compromising confidentiality and integrity within the affected scope. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3. 1 score of 4. 4, reflecting a medium risk due to the high attack complexity and required privileges.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:17:10 UTC

Technical Analysis

CVE-2026-1083 is a stored Cross-Site Scripting vulnerability identified in the Appointment Hour Booking – Booking Calendar plugin for WordPress, affecting all versions up to and including 1.5.60. The vulnerability stems from improper neutralization of input (CWE-79) in the form field configuration parameters, specifically the 'Min length/characters' and 'Max length/characters' fields. These fields lack sufficient input sanitization and output escaping, allowing an authenticated attacker with administrator-level access or higher to inject malicious JavaScript code. This malicious code is stored persistently and executed whenever a user accesses the form builder interface, which can lead to session hijacking, privilege escalation, or other malicious actions within the WordPress admin context. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, narrowing the affected scope. Exploitation does not require user interaction but does require high privileges, and the attack complexity is high due to these constraints. The vulnerability has a CVSS 3.1 base score of 4.4, indicating medium severity, with confidentiality and integrity impacts but no availability impact. No public exploits have been reported, and no patches are currently linked, suggesting that mitigation may require manual updates or configuration changes. The vulnerability was published on January 28, 2026, and assigned by Wordfence.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using the Appointment Hour Booking – Booking Calendar plugin in multi-site WordPress environments or where unfiltered_html is disabled. Successful exploitation could allow attackers with administrator privileges to inject persistent malicious scripts, potentially leading to unauthorized access to sensitive administrative functions, theft of credentials, or manipulation of booking data. This could disrupt business operations, damage reputation, and lead to data breaches involving personal or customer information. Since the attack requires high privileges, the risk is mitigated somewhat by existing access controls, but insider threats or compromised administrator accounts could be leveraged. The impact is particularly relevant for sectors relying heavily on online appointment scheduling such as healthcare, education, and professional services. The vulnerability does not affect availability directly but compromises confidentiality and integrity, which can have cascading effects on trust and compliance with data protection regulations like GDPR.

Mitigation Recommendations

To mitigate CVE-2026-1083, European organizations should: 1) Immediately verify if their WordPress installations use the Appointment Hour Booking – Booking Calendar plugin, especially in multi-site configurations or with unfiltered_html disabled. 2) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 3) Monitor and audit form builder interfaces for unusual or unauthorized script injections. 4) If a patch is released, apply it promptly; in the absence of an official patch, consider temporarily disabling the plugin or limiting its use to single-site installations where the vulnerability does not apply. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable fields. 6) Educate administrators about the risks of stored XSS and the importance of cautious input handling. 7) Regularly review and sanitize all input fields in custom plugins or configurations to prevent similar issues. 8) Backup WordPress sites regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-16T20:43:09.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979a3c14623b1157c91fb89

Added to database: 1/28/2026, 5:50:57 AM

Last enriched: 2/4/2026, 9:17:10 AM

Last updated: 2/6/2026, 11:26:25 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats