Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23622: CWE-352: Cross-Site Request Forgery (CSRF) in alextselegidis easyappointments

0
High
VulnerabilityCVE-2026-23622cvecve-2026-23622cwe-352
Published: Thu Jan 15 2026 (01/15/2026, 19:28:58 UTC)
Source: CVE Database V5
Vendor/Project: alextselegidis
Product: easyappointments

Description

CVE-2026-23622 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Easy! Appointments versions 1. 5. 2 and earlier. The vulnerability arises because the application only enforces CSRF protection on POST requests, while some state-changing operations accept parameters via GET requests, allowing attackers to craft malicious GET requests to perform unauthorized actions. Exploitation can lead to creation of admin accounts, modification of admin credentials, and full admin account takeover without requiring authentication. This flaw significantly compromises confidentiality, integrity, and availability of affected systems. European organizations using Easy! Appointments self-hosted scheduler are at risk, especially those with public-facing installations. Mitigation involves applying patches when available, restricting state-changing operations to POST methods only, and implementing CSRF tokens for all state-changing endpoints regardless of HTTP method.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:31:22 UTC

Technical Analysis

The vulnerability CVE-2026-23622 in Easy!Appointments (<= 1.5.2) stems from improper CSRF protection implementation. The core issue is that the csrf_verify() function in application/core/EA_Security.php enforces CSRF token validation only on POST requests, returning early for other HTTP methods. However, several endpoints perform sensitive, state-changing operations (such as creating admin accounts or modifying admin credentials) via GET or $_REQUEST parameters. This design flaw allows an attacker to craft malicious GET requests that, when executed by an authenticated victim's browser, perform unauthorized administrative actions without the victim's consent or knowledge. The vulnerability does not require prior authentication or elevated privileges, and user interaction is limited to visiting a maliciously crafted link or webpage. The impact includes full administrative account takeover, which compromises the confidentiality, integrity, and availability of the appointment scheduling system. Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a high-risk threat. The CVSS 4.0 vector reflects network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for entities relying on Easy!Appointments for managing sensitive appointment data, such as healthcare providers, government agencies, and service-oriented businesses. An attacker exploiting this flaw can gain full administrative control, leading to unauthorized data access, manipulation of appointments, disruption of services, and potential exposure of personal data protected under GDPR. The ability to create or modify admin accounts can facilitate persistent unauthorized access and lateral movement within the network. This can result in operational downtime, reputational damage, regulatory penalties, and financial losses. Public-facing installations are particularly vulnerable as they are accessible to remote attackers. The vulnerability’s exploitation could also be leveraged as a foothold for further attacks against European organizations, amplifying its impact.

Mitigation Recommendations

Organizations should immediately review their Easy!Appointments installations and upgrade to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should implement the following mitigations: (1) Restrict all state-changing operations to POST requests exclusively, eliminating GET-based state changes; (2) Enforce CSRF token validation on all endpoints that perform state changes, regardless of HTTP method; (3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests attempting state changes; (4) Conduct thorough audits of user roles and permissions to limit administrative privileges; (5) Monitor logs for unusual administrative activity or unexpected GET requests; (6) Educate users to avoid clicking on suspicious links and implement browser security policies such as SameSite cookies to reduce CSRF risks; (7) Isolate the appointment scheduler in a segmented network zone to limit potential lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-14T16:08:37.482Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6969476c1ab3796b1034af96

Added to database: 1/15/2026, 8:00:44 PM

Last enriched: 1/22/2026, 9:31:22 PM

Last updated: 2/7/2026, 5:30:58 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats