Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total7
Critical0
High2
Medium5
Reset
Showing 1-7 of 7 records
Threat Entry Updated 2026-04-13

CVE-2026-2519 - Bookly Plugin

The Online Scheduling and Appointment Booking System – Bookly plugin for WordPress is vulnerable to price manipulation via the 'tips' parameter in all versions up to, and including, 27.0. This is due to the plugin trusting a user-supplied input without server-side validation against the configured price. This makes it possible for unauthenticated attackers to submit a negative number to the 'tips' parameter, causing the total price to be reduced to zero.

PLUGIN Bookly

CVE-2026-2519

MEDIUM CVSS 5.3 2026-04-09
Threat Entry Updated 2024-11-21

CVE-2024-5584 - Bookly Plugin

The WordPress Online Booking and Scheduling Plugin – Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Color Profile parameter in all versions up to, and including, 23.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with the staff member role and Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Bookly

CVE-2024-5584

MEDIUM CVSS 6.4 2024-06-11
Threat Entry Updated 2024-11-21

CVE-2023-5209 - Bookly Plugin

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

PLUGIN Bookly

CVE-2023-5209

MEDIUM CVSS 4.8 2023-11-27
Threat Entry Updated 2025-04-23

CVE-2023-4691 - Bookly Plugin

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

PLUGIN Bookly

CVE-2023-4691

HIGH CVSS 7.2 2023-10-16
Threat Entry Updated 2024-11-21

CVE-2023-1159 - Bookly Plugin

The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via service titles in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Bookly

CVE-2023-1159

MEDIUM CVSS 4.0 2023-06-02
Threat Entry Updated 2024-11-21

CVE-2023-1172 - Bookly Plugin

The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Bookly

CVE-2023-1172

HIGH CVSS 7.2 2023-03-17
Threat Entry Updated 2024-11-21

CVE-2021-24930 - Bookly Plugin

The WordPress Online Booking and Scheduling Plugin WordPress plugin before 20.3.1 does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue

PLUGIN Bookly

CVE-2021-24930

MEDIUM CVSS 5.4 2021-12-06
Scroll to top