All the vulnerabilites related to TMS-Outsource - Amelia
cve-2023-29427
Vulnerability from cvelistv5
Published
2023-06-26 08:32
Modified
2024-10-10 17:10
Severity ?
EPSS score ?
Summary
WordPress Amelia Plugin <= 1.0.75 is vulnerable to Cross Site Scripting (XSS)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
TMS | Booking for Appointments and Events Calendar – Amelia |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:07:45.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-75-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-29427", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T17:10:30.810376Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T17:10:47.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "ameliabooking", "product": "Booking for Appointments and Events Calendar \u2013 Amelia", "vendor": "TMS", "versions": [ { "changes": [ { "at": "1.0.76", "status": "unaffected" } ], "lessThanOrEqual": "1.0.75", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "minhtuanact (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in TMS Booking for Appointments and Events Calendar \u2013 Amelia plugin \u0026lt;=\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;1.0.75 versions.\u003c/span\u003e" } ], "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in TMS Booking for Appointments and Events Calendar \u2013 Amelia plugin \u003c=\u00a01.0.75 versions." } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-26T08:33:02.113Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-75-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;1.0.76 or a higher version." } ], "value": "Update to\u00a01.0.76 or a higher version." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Amelia Plugin \u003c= 1.0.75 is vulnerable to Cross Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-29427", "datePublished": "2023-06-26T08:32:55.825Z", "dateReserved": "2023-04-06T08:15:32.683Z", "dateUpdated": "2024-10-10T17:10:47.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0837
Vulnerability from cvelistv5
Published
2022-04-04 15:35
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Amelia < 1.0.48 - Customer+ SMS Service Abuse and Sensitive Data Disclosure
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:04.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Amelia", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.48", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Huli from Cymetrics" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.48 does not have proper authorisation when handling Amelia SMS service, allowing any customer to send paid test SMS notification as well as retrieve sensitive information about the admin, such as the email, account balance and payment history. A malicious actor can abuse this vulnerability to drain out the account balance by keep sending SMS notification." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T07:18:27.409Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.48 - Customer+ SMS Service Abuse and Sensitive Data Disclosure", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0837", "datePublished": "2022-04-04T15:35:52", "dateReserved": "2022-03-03T00:00:00", "dateUpdated": "2024-08-02T23:40:04.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0687
Vulnerability from cvelistv5
Published
2022-03-21 18:55
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Amelia < 1.0.46 - Manager+ RCE
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Amelia – Events & Appointments Booking Calendar |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.47", "status": "affected", "version": "1.0.47", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "qerogram" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom \"Amelia Manager\" role." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T18:55:57", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.46 - Manager+ RCE", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0687", "STATE": "PUBLIC", "TITLE": "Amelia \u003c 1.0.46 - Manager+ RCE" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.0.47", "version_value": "1.0.47" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "qerogram" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom \"Amelia Manager\" role." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0687", "datePublished": "2022-03-21T18:55:57", "dateReserved": "2022-02-19T00:00:00", "dateUpdated": "2024-08-02T23:40:03.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0616
Vulnerability from cvelistv5
Published
2022-03-21 18:55
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Amelia < 1.0.46 - Arbitrary Customer Deletion via CSRF
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Amelia – Events & Appointments Booking Calendar |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.47", "status": "affected", "version": "1.0.47", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Muhamad Hidayat" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T18:55:50", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.46 - Arbitrary Customer Deletion via CSRF", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0616", "STATE": "PUBLIC", "TITLE": "Amelia \u003c 1.0.46 - Arbitrary Customer Deletion via CSRF" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.0.47", "version_value": "1.0.47" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Muhamad Hidayat" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0616", "datePublished": "2022-03-21T18:55:50", "dateReserved": "2022-02-15T00:00:00", "dateUpdated": "2024-08-02T23:32:46.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0720
Vulnerability from cvelistv5
Published
2022-03-28 17:23
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Amelia < 1.0.47 - Customer+ Arbitrary Appointments Update and Sensitive Data Disclosure
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Amelia – Events & Appointments Booking Calendar |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.47", "status": "affected", "version": "1.0.47", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "huli of Cymetrics" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.47 does not have proper authorisation when managing appointments, allowing any customer to update other\u0027s booking, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-28T17:23:18", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.47 - Customer+ Arbitrary Appointments Update and Sensitive Data Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0720", "STATE": "PUBLIC", "TITLE": "Amelia \u003c 1.0.47 - Customer+ Arbitrary Appointments Update and Sensitive Data Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.0.47", "version_value": "1.0.47" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "huli of Cymetrics" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Amelia WordPress plugin before 1.0.47 does not have proper authorisation when managing appointments, allowing any customer to update other\u0027s booking, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863 Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0720", "datePublished": "2022-03-28T17:23:18", "dateReserved": "2022-02-22T00:00:00", "dateUpdated": "2024-08-02T23:40:03.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6808
Vulnerability from cvelistv5
Published
2024-02-05 21:21
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-6808", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-06T15:38:25.365380Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:32.480Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aafb5402-3553-4c89-86e0-4dd556d86074?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://plugins.svn.wordpress.org/ameliabooking/trunk/view/frontend/events.inc.php" }, { "tags": [ "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/3015149/ameliabooking/trunk/view/frontend/events.inc.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Booking for Appointments and Events Calendar \u2013 Amelia", "vendor": "ameliabooking", "versions": [ { "lessThanOrEqual": "1.0.93", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Ng\u00f4 Thi\u00ean An" } ], "descriptions": [ { "lang": "en", "value": "The Booking for Appointments and Events Calendar \u2013 Amelia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin\u0027s shortcode(s) in all versions up to, and including, 1.0.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-05T21:21:57.486Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aafb5402-3553-4c89-86e0-4dd556d86074?source=cve" }, { "url": "https://plugins.svn.wordpress.org/ameliabooking/trunk/view/frontend/events.inc.php" }, { "url": "https://plugins.trac.wordpress.org/changeset/3015149/ameliabooking/trunk/view/frontend/events.inc.php" } ], "timeline": [ { "lang": "en", "time": "2024-01-18T00:00:00.000+00:00", "value": "Disclosed" } ] } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2023-6808", "datePublished": "2024-02-05T21:21:57.486Z", "dateReserved": "2023-12-13T21:11:14.727Z", "dateUpdated": "2024-08-02T08:42:08.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6225
Vulnerability from cvelistv5
Published
2024-06-21 07:39
Modified
2024-08-01 21:33
Severity ?
EPSS score ?
Summary
Amelia <= 1.1.5 & Amelia (Pro) <= 7.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-27T17:55:36.498373Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T19:01:03.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04597908-7086-4158-ae2b-8aa634a217c6?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3092932%40ameliabooking\u0026new=3092932%40ameliabooking\u0026sfp_email=\u0026sfph_mail=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Booking for Appointments and Events Calendar \u2013 Amelia", "vendor": "ameliabooking", "versions": [ { "lessThanOrEqual": "1.1.5", "status": "affected", "version": "*", "versionType": "semver" }, { "lessThanOrEqual": "7.5.1", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Vinay Kumar" } ], "descriptions": [ { "lang": "en", "value": "The Booking for Appointments and Events Calendar \u2013 Amelia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1.5 (and 7.5.1 for the Pro version) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T07:39:57.465Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04597908-7086-4158-ae2b-8aa634a217c6?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3092932%40ameliabooking\u0026new=3092932%40ameliabooking\u0026sfp_email=\u0026sfph_mail=" } ], "timeline": [ { "lang": "en", "time": "2024-06-20T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Amelia \u003c= 1.1.5 \u0026 Amelia (Pro) \u003c= 7.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-6225", "datePublished": "2024-06-21T07:39:57.465Z", "dateReserved": "2024-06-20T19:04:42.297Z", "dateUpdated": "2024-08-01T21:33:05.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-50860
Vulnerability from cvelistv5
Published
2023-12-28 10:14
Modified
2024-08-02 22:23
Severity ?
EPSS score ?
Summary
WordPress Amelia Plugin <= 1.0.85 is vulnerable to Cross Site Scripting (XSS)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
TMS | Booking for Appointments and Events Calendar – Amelia |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:23:43.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-85-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "ameliabooking", "product": "Booking for Appointments and Events Calendar \u2013 Amelia", "vendor": "TMS", "versions": [ { "changes": [ { "at": "1.0.86", "status": "unaffected" } ], "lessThanOrEqual": "1.0.85", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "NG\u00d4 THI\u00caN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in TMS Booking for Appointments and Events Calendar \u2013 Amelia allows Stored XSS.\u003cp\u003eThis issue affects Booking for Appointments and Events Calendar \u2013 Amelia: from n/a through 1.0.85.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in TMS Booking for Appointments and Events Calendar \u2013 Amelia allows Stored XSS.This issue affects Booking for Appointments and Events Calendar \u2013 Amelia: from n/a through 1.0.85.\n\n" } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-28T10:14:11.022Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-85-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;1.0.86 or a higher version." } ], "value": "Update to\u00a01.0.86 or a higher version." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Amelia Plugin \u003c= 1.0.85 is vulnerable to Cross Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-50860", "datePublished": "2023-12-28T10:14:11.022Z", "dateReserved": "2023-12-14T17:19:16.270Z", "dateUpdated": "2024-08-02T22:23:43.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-27918
Vulnerability from cvelistv5
Published
2023-05-10 00:00
Modified
2024-08-02 12:23
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in Appointment and Event Booking Calendar for WordPress - Amelia versions prior to 1.0.76 allows a remote unauthenticated attacker to inject an arbitrary script by having a user who is logging in the WordPress where the product is installed visit a malicious URL.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:23:30.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wordpress.org/plugins/ameliabooking/#developers" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN00971105/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Appointment and Event Booking Calendar for WordPress - Amelia", "vendor": "TMS", "versions": [ { "status": "affected", "version": "versions prior to 1.0.76" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Appointment and Event Booking Calendar for WordPress - Amelia versions prior to 1.0.76 allows a remote unauthenticated attacker to inject an arbitrary script by having a user who is logging in the WordPress where the product is installed visit a malicious URL." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://wordpress.org/plugins/ameliabooking/#developers" }, { "url": "https://jvn.jp/en/jp/JVN00971105/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-27918", "datePublished": "2023-05-10T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T12:23:30.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0825
Vulnerability from cvelistv5
Published
2022-04-04 15:35
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Amelia < 1.0.49 - Customer+ Arbitrary Appointments Status Update
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2693545 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Amelia – Events & Appointments Booking Calendar |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:04.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2693545" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.49", "status": "affected", "version": "1.0.49", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Huli from Cymetrics" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other\u0027s booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-04T15:35:49", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2693545" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.49 - Customer+ Arbitrary Appointments Status Update", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0825", "STATE": "PUBLIC", "TITLE": "Amelia \u003c 1.0.49 - Customer+ Arbitrary Appointments Status Update" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.0.49", "version_value": "1.0.49" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Huli from Cymetrics" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other\u0027s booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863 Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e" }, { "name": "https://plugins.trac.wordpress.org/changeset/2693545", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2693545" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0825", "datePublished": "2022-04-04T15:35:49", "dateReserved": "2022-03-02T00:00:00", "dateUpdated": "2024-08-02T23:40:04.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0627
Vulnerability from cvelistv5
Published
2022-03-21 18:55
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Amelia < 1.0.46 - Reflected Cross-Site Scripting
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Amelia – Events & Appointments Booking Calendar |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "vendor": "Unknown", "versions": [ { "lessThan": "1.0.47", "status": "affected", "version": "1.0.47", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ran Crane" } ], "descriptions": [ { "lang": "en", "value": "The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T18:55:51", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4" } ], "source": { "discovery": "EXTERNAL" }, "title": "Amelia \u003c 1.0.46 - Reflected Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0627", "STATE": "PUBLIC", "TITLE": "Amelia \u003c 1.0.46 - Reflected Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Amelia \u2013 Events \u0026 Appointments Booking Calendar", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.0.47", "version_value": "1.0.47" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ran Crane" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0627", "datePublished": "2022-03-21T18:55:51", "dateReserved": "2022-02-16T00:00:00", "dateUpdated": "2024-08-02T23:32:46.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2023-000040
Vulnerability from jvndb
Published
2023-04-24 13:41
Modified
2024-05-28 16:59
Severity ?
Summary
WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting
Details
WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" provided by TMS contains a cross-site scripting vulnerability (CWE-79).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN00971105/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2023-27918 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2023-27918 | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
TMS-Outsource | Amelia |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000040.html", "dc:date": "2024-05-28T16:59+09:00", "dcterms:issued": "2023-04-24T13:41+09:00", "dcterms:modified": "2024-05-28T16:59+09:00", "description": "WordPress Plugin \"Appointment and Event Booking Calendar for WordPress - Amelia\" provided by TMS contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nGen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000040.html", "sec:cpe": { "#text": "cpe:/a:tms-outsource:amelia", "@product": "Amelia", "@vendor": "TMS-Outsource", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "6.1", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000040", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN00971105/index.html", "@id": "JVN#00971105", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-27918", "@id": "CVE-2023-27918", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-27918", "@id": "CVE-2023-27918", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "WordPress Plugin \"Appointment and Event Booking Calendar for WordPress - Amelia\" vulnerable to cross-site scripting" }