Vulnerability Report
Plugin High Patch path listed

Booking calendar, Appointment Booking System <= 3.2.8 - Multiple Authenticated(Editor+) SQL Injection

The Booking calendar plugin for WordPress is vulnerable to SQL Injection via the search functionality on multiple administrative pages in versions up to, and including, 3.2.8 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with Editor privileges and above to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Note that the Pro version of the plugin allows administrators to grant access to the plugin's Administrative pages to any user role, so other roles may be able to exploit the vulnerability if they have been granted access.

Quick Answer

This vulnerability is a high severity with CVSS 7.2 SQL Injection issue affecting the Plugin Booking calendar, Appointment Booking System. It affects Versions before 3.2.9 and is fixed in 3.2.9.

Published
Sep 12, 2023
Last Updated
Jan 22, 2024
Slug
booking-calendar
Operational Summary

What the operator needs to know

Patch Status
Patched release is available
Remediation
Update to version 3.2.9, or a newer patched version
Operator Briefing

the tracked vulnerability is tracked for the Plugin Booking calendar, Appointment Booking System as high severity with CVSS 7.2. The affected range is Versions before 3.2.9. Update Booking calendar, Appointment Booking System to 3.2.9 or newer where that version is compatible with the site.

Issue Type
SQL Injection
Primary Fixed Version
3.2.9
Primary Affected Range
Versions before 3.2.9
Tracking ID
a02f4fc4-42ca-4f8e-9c28-bfa69644e7b6
Detailed Metadata
Software Type Plugin
Software Slug
booking-calendar View on wordpress.org
CVE No linked CVE entry.
Patched Versions
3.2.9
Affected Versions
Versions before 3.2.9
Related CVE Cluster

Related CVEs for Booking calendar, Appointment Booking System

These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.

Critical CVE-2022-3982 3.2.2 Nov 21, 2022
CVE-2022-3982 Booking calendar, Appointment Booking System Remote Code Execution

Booking calendar, Appointment Booking System <= 3.2.1 - Unauthenticated Arbitrary File Upload

High CVE-2018-5673 2.1.8 Jan 12, 2018
CVE-2018-5673 Booking calendar, Appointment Booking System Cross-Site Request Forgery

Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Request Forgery

High CVE-2018-10363 2.2.3 Jun 07, 2018
CVE-2018-10363 Booking calendar, Appointment Booking System Vulnerability

Booking calendar, Appointment Booking System < 2.2.3 - Unauthenticated Parameter Manipulation

High CVE-2026-25435 No patch listed Mar 18, 2026
CVE-2026-25435 Booking calendar, Appointment Booking System Stored Cross-Site Scripting

Booking calendar, Appointment Booking System <= 3.2.36 - Unauthenticated Stored Cross-Site Scripting

High CVE-2024-9504 3.2.16 Nov 25, 2024
CVE-2024-9504 Booking calendar, Appointment Booking System File Upload

Booking calendar, Appointment Booking System <= 3.2.15 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload

High CVE-2022-47428 3.2.7 Apr 19, 2023
CVE-2022-47428 Booking calendar, Appointment Booking System SQL Injection

Booking calendar, Appointment Booking System <= 3.2.6 - Authenticated (Administrator+) SQL Injection via *_selected

Medium CVE-2024-10856 3.2.20 Dec 23, 2024
CVE-2024-10856 Booking calendar, Appointment Booking System SQL Injection

Booking Calendar WpDevArt <= 3.2.19 - Authenticated (Contributor+) SQL Injection

Medium CVE-2024-12077 3.2.20 Jan 06, 2025
CVE-2024-12077 Booking calendar, Appointment Booking System Cross-Site Scripting

Booking Calendar and Booking Calendar Pro <= Multiple Versions - Reflected Cross-Site Scripting via 'calendar_id'

Licensing Notices

This record contains material that is subject to copyright

DEFIANT
Copyright 2012-2026 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more