UNKNOWN (0.0)
    Plugin

    Sensitive Information Exposure in Appointment Booking Calendar Plugin

    Published Date: 1/6/2026
    CVE ID: CVE-2025-11723

    Summary

    The Simply Schedule Appointments Booking Plugin for WordPress is vulnerable to sensitive information exposure due to a hardcoded fall-back salt used in token generation. This flaw exists in versions up to 1.6.9.5, allowing attackers to potentially access and modify booking information without authentication.

    Vulnerability Details

    The vulnerability is rooted in the Appointment Booking Calendar plugin's use of the hash() function with a fallback salt that is hardcoded. When instances of the plugin do not have a custom salt specified in the WordPress configuration file (wp-config.php), the same fallback salt is used across all installations. This oversight enables attackers to generate valid authentication tokens. Once a token is generated using the common fall-back salt, it can be used to gain unauthorized access to sensitive booking information. Attackers could exploit this vulnerability to view or modify booking data, disrupting operations and potentially leading to further security implications. The severity is as yet unclassified, but the exposure of sensitive information presents tangible risks to websites using this plugin.

    Recommendations

    To mitigate this vulnerability, administrators should manually set a unique salt in the wp-config.php file for the plugin. Additionally, review and modify access controls and permissions related to sensitive booking data to limit potential risks from unauthorized access.

    Available Fixes

    Last Updated: 1/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More