CNVD-2025-29102

Vulnerability from cnvd - Published: 2025-11-20
VLAI Severity ?
Title
WordPress Booking Manager plugin跨站脚本漏洞
Description
WordPress Booking Manager plugin是一款用于管理预约和日程的工具,支持与外部ICS日历同步、导入事件和导出预订数据等功能。 WordPress Booking Manager plugin存在跨站脚本漏洞,该漏洞源于输入中和不当,目前没有详细的漏洞细节提供。
Severity
Patch Name
WordPress Booking Manager plugin跨站脚本漏洞的补丁
Patch Description
WordPress Booking Manager plugin是一款用于管理预约和日程的工具,支持与外部ICS日历同步、导入事件和导出预订数据等功能。 WordPress Booking Manager plugin存在跨站脚本漏洞,该漏洞源于输入中和不当,目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://wordpress.org/plugins/booking-manager/

Reference
https://vdp.patchstack.com/database/Wordpress/Plugin/booking-manager/vulnerability/wordpress-booking-manager-plugin-2-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve
Impacted products
Name
WordPress Booking Manager plugin <=2.1.17
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2025-64275",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-64275"
    }
  },
  "description": "WordPress Booking Manager plugin\u662f\u4e00\u6b3e\u7528\u4e8e\u7ba1\u7406\u9884\u7ea6\u548c\u65e5\u7a0b\u7684\u5de5\u5177\uff0c\u652f\u6301\u4e0e\u5916\u90e8ICS\u65e5\u5386\u540c\u6b65\u3001\u5bfc\u5165\u4e8b\u4ef6\u548c\u5bfc\u51fa\u9884\u8ba2\u6570\u636e\u7b49\u529f\u80fd\u3002\n\nWordPress Booking Manager plugin\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u8f93\u5165\u4e2d\u548c\u4e0d\u5f53\uff0c\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51:\r\nhttps://wordpress.org/plugins/booking-manager/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2025-29102",
  "openTime": "2025-11-20",
  "patchDescription": "WordPress Booking Manager plugin\u662f\u4e00\u6b3e\u7528\u4e8e\u7ba1\u7406\u9884\u7ea6\u548c\u65e5\u7a0b\u7684\u5de5\u5177\uff0c\u652f\u6301\u4e0e\u5916\u90e8ICS\u65e5\u5386\u540c\u6b65\u3001\u5bfc\u5165\u4e8b\u4ef6\u548c\u5bfc\u51fa\u9884\u8ba2\u6570\u636e\u7b49\u529f\u80fd\u3002\r\n\r\nWordPress Booking Manager plugin\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u8f93\u5165\u4e2d\u548c\u4e0d\u5f53\uff0c\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "WordPress Booking Manager plugin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "WordPress Booking Manager plugin \u003c=2.1.17"
  },
  "referenceLink": "https://vdp.patchstack.com/database/Wordpress/Plugin/booking-manager/vulnerability/wordpress-booking-manager-plugin-2-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve",
  "serverity": "\u4e2d",
  "submitTime": "2025-11-18",
  "title": "WordPress Booking Manager plugin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…