CVE-2026-23622: CWE-352: Cross-Site Request Forgery (CSRF) in alextselegidis easyappointments
Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.
AI Analysis
Technical Summary
CVE-2026-23622 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Easy!Appointments, a self-hosted appointment scheduling application. The root cause lies in the application's security mechanism within application/core/EA_Security.php, specifically the csrf_verify() function, which enforces CSRF protection only on POST requests. However, several endpoints in Easy!Appointments perform state-changing operations (such as creating or modifying admin accounts) while accepting parameters via GET requests or the $_REQUEST superglobal, which includes GET parameters. Because CSRF tokens are not verified for these GET requests, an attacker can craft malicious URLs that, when visited by an authenticated user, cause unauthorized actions to be performed without their consent. This can lead to severe consequences including the creation of new admin accounts, modification of existing admin email addresses or passwords, and ultimately full administrative account takeover. The vulnerability requires no prior authentication or privileges and can be exploited remotely through social engineering techniques that induce victims to visit maliciously crafted URLs. The CVSS 4.0 score of 7.4 reflects the vulnerability's network attack vector, low attack complexity, no required privileges or authentication, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant given the administrative control that can be gained. The vulnerability affects Easy!Appointments versions 1.5.2 and earlier, and no official patches are linked in the provided data, indicating that users must apply custom mitigations or upgrade once a fix is released.
Potential Impact
For European organizations, especially those in healthcare, professional services, and other appointment-driven sectors, this vulnerability poses a significant risk. Easy!Appointments is often used for scheduling client or patient appointments, and compromise of admin accounts can lead to unauthorized access to sensitive personal data, manipulation of appointment schedules, and disruption of business operations. Attackers gaining admin privileges can alter system configurations, create backdoors, or exfiltrate confidential information, impacting data confidentiality and integrity. The availability of the scheduling service can also be compromised by malicious modifications or deletions. Given the reliance on self-hosted deployments, organizations with less mature patch management or security monitoring may be particularly vulnerable. The vulnerability's exploitation does not require authentication, increasing the attack surface. Additionally, the use of GET requests for state-changing operations is a design flaw that may be exploited in phishing campaigns targeting European users. The impact extends beyond individual organizations to potentially affect service continuity and trust in digital appointment systems across Europe.
Mitigation Recommendations
Immediate mitigation steps include reviewing all Easy!Appointments endpoints that accept GET or $_REQUEST parameters to ensure no state-changing operations are performed via GET requests. Administrators should implement CSRF protections on all endpoints, including those handling GET requests, by enforcing token verification regardless of HTTP method. If upgrading to a fixed version is not yet possible, web application firewalls (WAFs) can be configured to block suspicious GET requests that attempt to perform administrative actions. Organizations should also educate users to avoid clicking on untrusted links and monitor logs for unusual GET requests that trigger state changes. Network segmentation and limiting access to the Easy!Appointments interface to trusted IP ranges can reduce exposure. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, organizations should track vendor updates closely and apply patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2026-23622: CWE-352: Cross-Site Request Forgery (CSRF) in alextselegidis easyappointments
Description
Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.
AI-Powered Analysis
Technical Analysis
CVE-2026-23622 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Easy!Appointments, a self-hosted appointment scheduling application. The root cause lies in the application's security mechanism within application/core/EA_Security.php, specifically the csrf_verify() function, which enforces CSRF protection only on POST requests. However, several endpoints in Easy!Appointments perform state-changing operations (such as creating or modifying admin accounts) while accepting parameters via GET requests or the $_REQUEST superglobal, which includes GET parameters. Because CSRF tokens are not verified for these GET requests, an attacker can craft malicious URLs that, when visited by an authenticated user, cause unauthorized actions to be performed without their consent. This can lead to severe consequences including the creation of new admin accounts, modification of existing admin email addresses or passwords, and ultimately full administrative account takeover. The vulnerability requires no prior authentication or privileges and can be exploited remotely through social engineering techniques that induce victims to visit maliciously crafted URLs. The CVSS 4.0 score of 7.4 reflects the vulnerability's network attack vector, low attack complexity, no required privileges or authentication, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant given the administrative control that can be gained. The vulnerability affects Easy!Appointments versions 1.5.2 and earlier, and no official patches are linked in the provided data, indicating that users must apply custom mitigations or upgrade once a fix is released.
Potential Impact
For European organizations, especially those in healthcare, professional services, and other appointment-driven sectors, this vulnerability poses a significant risk. Easy!Appointments is often used for scheduling client or patient appointments, and compromise of admin accounts can lead to unauthorized access to sensitive personal data, manipulation of appointment schedules, and disruption of business operations. Attackers gaining admin privileges can alter system configurations, create backdoors, or exfiltrate confidential information, impacting data confidentiality and integrity. The availability of the scheduling service can also be compromised by malicious modifications or deletions. Given the reliance on self-hosted deployments, organizations with less mature patch management or security monitoring may be particularly vulnerable. The vulnerability's exploitation does not require authentication, increasing the attack surface. Additionally, the use of GET requests for state-changing operations is a design flaw that may be exploited in phishing campaigns targeting European users. The impact extends beyond individual organizations to potentially affect service continuity and trust in digital appointment systems across Europe.
Mitigation Recommendations
Immediate mitigation steps include reviewing all Easy!Appointments endpoints that accept GET or $_REQUEST parameters to ensure no state-changing operations are performed via GET requests. Administrators should implement CSRF protections on all endpoints, including those handling GET requests, by enforcing token verification regardless of HTTP method. If upgrading to a fixed version is not yet possible, web application firewalls (WAFs) can be configured to block suspicious GET requests that attempt to perform administrative actions. Organizations should also educate users to avoid clicking on untrusted links and monitor logs for unusual GET requests that trigger state changes. Network segmentation and limiting access to the Easy!Appointments interface to trusted IP ranges can reduce exposure. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, organizations should track vendor updates closely and apply patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-14T16:08:37.482Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6969476c1ab3796b1034af96
Added to database: 1/15/2026, 8:00:44 PM
Last enriched: 1/15/2026, 8:15:36 PM
Last updated: 1/15/2026, 9:49:16 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67822: n/a
UnknownCVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
MediumCVE-2025-52987: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights)
MediumCVE-2025-65368: n/a
MediumCVE-2025-67025: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.