Beta

Report

Bookly <= 23.2 is vulnerable to Authenticated (Subscriber+) Stored Cross-Site Scripting via Color Profile Parameter vulnerability

Subscriber
Published
2024-06-10

The WordPress Online Booking and Scheduling Plugin – Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Color Profile parameter in all versions up to, and including, 23.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with the staff member role and Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS

Score:6.5

Severity:Medium

Version: 23.2

There is a patch available in v23.3 and we strongly recommend you update to this version as soon as possible.