CVE-2026-1083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codepeople Appointment Hour Booking – Booking Calendar
CVE-2026-1083 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability in the Appointment Hour Booking – Booking Calendar WordPress plugin affecting all versions up to 1. 5. 60. The flaw arises from insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' form configuration fields. Exploitation requires authenticated users with administrator-level privileges or higher and only affects multi-site WordPress installations or those with unfiltered_html disabled. Successful exploitation allows injection of arbitrary scripts that execute when users access the form builder interface, potentially compromising confidentiality and integrity within the affected scope. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3. 1 score of 4. 4, reflecting a medium risk due to the high attack complexity and required privileges.
AI Analysis
Technical Summary
CVE-2026-1083 is a stored Cross-Site Scripting vulnerability identified in the Appointment Hour Booking – Booking Calendar plugin for WordPress, affecting all versions up to and including 1.5.60. The vulnerability stems from improper neutralization of input (CWE-79) in the form field configuration parameters, specifically the 'Min length/characters' and 'Max length/characters' fields. These fields lack sufficient input sanitization and output escaping, allowing an authenticated attacker with administrator-level access or higher to inject malicious JavaScript code. This malicious code is stored persistently and executed whenever a user accesses the form builder interface, which can lead to session hijacking, privilege escalation, or other malicious actions within the WordPress admin context. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, narrowing the affected scope. Exploitation does not require user interaction but does require high privileges, and the attack complexity is high due to these constraints. The vulnerability has a CVSS 3.1 base score of 4.4, indicating medium severity, with confidentiality and integrity impacts but no availability impact. No public exploits have been reported, and no patches are currently linked, suggesting that mitigation may require manual updates or configuration changes. The vulnerability was published on January 28, 2026, and assigned by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those using the Appointment Hour Booking – Booking Calendar plugin in multi-site WordPress environments or where unfiltered_html is disabled. Successful exploitation could allow attackers with administrator privileges to inject persistent malicious scripts, potentially leading to unauthorized access to sensitive administrative functions, theft of credentials, or manipulation of booking data. This could disrupt business operations, damage reputation, and lead to data breaches involving personal or customer information. Since the attack requires high privileges, the risk is mitigated somewhat by existing access controls, but insider threats or compromised administrator accounts could be leveraged. The impact is particularly relevant for sectors relying heavily on online appointment scheduling such as healthcare, education, and professional services. The vulnerability does not affect availability directly but compromises confidentiality and integrity, which can have cascading effects on trust and compliance with data protection regulations like GDPR.
Mitigation Recommendations
To mitigate CVE-2026-1083, European organizations should: 1) Immediately verify if their WordPress installations use the Appointment Hour Booking – Booking Calendar plugin, especially in multi-site configurations or with unfiltered_html disabled. 2) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 3) Monitor and audit form builder interfaces for unusual or unauthorized script injections. 4) If a patch is released, apply it promptly; in the absence of an official patch, consider temporarily disabling the plugin or limiting its use to single-site installations where the vulnerability does not apply. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable fields. 6) Educate administrators about the risks of stored XSS and the importance of cautious input handling. 7) Regularly review and sanitize all input fields in custom plugins or configurations to prevent similar issues. 8) Backup WordPress sites regularly to enable quick recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-1083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codepeople Appointment Hour Booking – Booking Calendar
Description
CVE-2026-1083 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability in the Appointment Hour Booking – Booking Calendar WordPress plugin affecting all versions up to 1. 5. 60. The flaw arises from insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' form configuration fields. Exploitation requires authenticated users with administrator-level privileges or higher and only affects multi-site WordPress installations or those with unfiltered_html disabled. Successful exploitation allows injection of arbitrary scripts that execute when users access the form builder interface, potentially compromising confidentiality and integrity within the affected scope. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3. 1 score of 4. 4, reflecting a medium risk due to the high attack complexity and required privileges.
AI-Powered Analysis
Technical Analysis
CVE-2026-1083 is a stored Cross-Site Scripting vulnerability identified in the Appointment Hour Booking – Booking Calendar plugin for WordPress, affecting all versions up to and including 1.5.60. The vulnerability stems from improper neutralization of input (CWE-79) in the form field configuration parameters, specifically the 'Min length/characters' and 'Max length/characters' fields. These fields lack sufficient input sanitization and output escaping, allowing an authenticated attacker with administrator-level access or higher to inject malicious JavaScript code. This malicious code is stored persistently and executed whenever a user accesses the form builder interface, which can lead to session hijacking, privilege escalation, or other malicious actions within the WordPress admin context. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, narrowing the affected scope. Exploitation does not require user interaction but does require high privileges, and the attack complexity is high due to these constraints. The vulnerability has a CVSS 3.1 base score of 4.4, indicating medium severity, with confidentiality and integrity impacts but no availability impact. No public exploits have been reported, and no patches are currently linked, suggesting that mitigation may require manual updates or configuration changes. The vulnerability was published on January 28, 2026, and assigned by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those using the Appointment Hour Booking – Booking Calendar plugin in multi-site WordPress environments or where unfiltered_html is disabled. Successful exploitation could allow attackers with administrator privileges to inject persistent malicious scripts, potentially leading to unauthorized access to sensitive administrative functions, theft of credentials, or manipulation of booking data. This could disrupt business operations, damage reputation, and lead to data breaches involving personal or customer information. Since the attack requires high privileges, the risk is mitigated somewhat by existing access controls, but insider threats or compromised administrator accounts could be leveraged. The impact is particularly relevant for sectors relying heavily on online appointment scheduling such as healthcare, education, and professional services. The vulnerability does not affect availability directly but compromises confidentiality and integrity, which can have cascading effects on trust and compliance with data protection regulations like GDPR.
Mitigation Recommendations
To mitigate CVE-2026-1083, European organizations should: 1) Immediately verify if their WordPress installations use the Appointment Hour Booking – Booking Calendar plugin, especially in multi-site configurations or with unfiltered_html disabled. 2) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege abuse. 3) Monitor and audit form builder interfaces for unusual or unauthorized script injections. 4) If a patch is released, apply it promptly; in the absence of an official patch, consider temporarily disabling the plugin or limiting its use to single-site installations where the vulnerability does not apply. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable fields. 6) Educate administrators about the risks of stored XSS and the importance of cautious input handling. 7) Regularly review and sanitize all input fields in custom plugins or configurations to prevent similar issues. 8) Backup WordPress sites regularly to enable quick recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-16T20:43:09.863Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979a3c14623b1157c91fb89
Added to database: 1/28/2026, 5:50:57 AM
Last enriched: 2/4/2026, 9:17:10 AM
Last updated: 2/6/2026, 11:26:25 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.