Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23622: CWE-352: Cross-Site Request Forgery (CSRF) in alextselegidis easyappointments

0
High
VulnerabilityCVE-2026-23622cvecve-2026-23622cwe-352
Published: Thu Jan 15 2026 (01/15/2026, 19:28:58 UTC)
Source: CVE Database V5
Vendor/Project: alextselegidis
Product: easyappointments

Description

Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:15:36 UTC

Technical Analysis

CVE-2026-23622 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Easy!Appointments, a self-hosted appointment scheduling application. The root cause lies in the application's security mechanism within application/core/EA_Security.php, specifically the csrf_verify() function, which enforces CSRF protection only on POST requests. However, several endpoints in Easy!Appointments perform state-changing operations (such as creating or modifying admin accounts) while accepting parameters via GET requests or the $_REQUEST superglobal, which includes GET parameters. Because CSRF tokens are not verified for these GET requests, an attacker can craft malicious URLs that, when visited by an authenticated user, cause unauthorized actions to be performed without their consent. This can lead to severe consequences including the creation of new admin accounts, modification of existing admin email addresses or passwords, and ultimately full administrative account takeover. The vulnerability requires no prior authentication or privileges and can be exploited remotely through social engineering techniques that induce victims to visit maliciously crafted URLs. The CVSS 4.0 score of 7.4 reflects the vulnerability's network attack vector, low attack complexity, no required privileges or authentication, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant given the administrative control that can be gained. The vulnerability affects Easy!Appointments versions 1.5.2 and earlier, and no official patches are linked in the provided data, indicating that users must apply custom mitigations or upgrade once a fix is released.

Potential Impact

For European organizations, especially those in healthcare, professional services, and other appointment-driven sectors, this vulnerability poses a significant risk. Easy!Appointments is often used for scheduling client or patient appointments, and compromise of admin accounts can lead to unauthorized access to sensitive personal data, manipulation of appointment schedules, and disruption of business operations. Attackers gaining admin privileges can alter system configurations, create backdoors, or exfiltrate confidential information, impacting data confidentiality and integrity. The availability of the scheduling service can also be compromised by malicious modifications or deletions. Given the reliance on self-hosted deployments, organizations with less mature patch management or security monitoring may be particularly vulnerable. The vulnerability's exploitation does not require authentication, increasing the attack surface. Additionally, the use of GET requests for state-changing operations is a design flaw that may be exploited in phishing campaigns targeting European users. The impact extends beyond individual organizations to potentially affect service continuity and trust in digital appointment systems across Europe.

Mitigation Recommendations

Immediate mitigation steps include reviewing all Easy!Appointments endpoints that accept GET or $_REQUEST parameters to ensure no state-changing operations are performed via GET requests. Administrators should implement CSRF protections on all endpoints, including those handling GET requests, by enforcing token verification regardless of HTTP method. If upgrading to a fixed version is not yet possible, web application firewalls (WAFs) can be configured to block suspicious GET requests that attempt to perform administrative actions. Organizations should also educate users to avoid clicking on untrusted links and monitor logs for unusual GET requests that trigger state changes. Network segmentation and limiting access to the Easy!Appointments interface to trusted IP ranges can reduce exposure. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, organizations should track vendor updates closely and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-14T16:08:37.482Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6969476c1ab3796b1034af96

Added to database: 1/15/2026, 8:00:44 PM

Last enriched: 1/15/2026, 8:15:36 PM

Last updated: 1/15/2026, 9:49:16 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats