Home

Description

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted they have obtained a valid `public_token` that is inadvertently exposed during the booking flow.

PUBLISHED Reserved 2026-01-30 | Published 2026-03-11 | Updated 2026-03-11 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-30:Vendor Notified
2026-03-10:Disclosed

Credits

Thanh Hao finder

References

www.wordfence.com/...-9fe0-44a9-88f3-70167dc6ca62?source=cve

plugins.trac.wordpress.org/.../td-util/class-td-db-model.php

plugins.trac.wordpress.org/.../td-util/class-td-db-model.php

plugins.trac.wordpress.org/.../td-util/class-td-db-model.php

plugins.trac.wordpress.org/.../td-util/class-td-db-model.php

plugins.trac.wordpress.org/...es/class-appointment-model.php

plugins.trac.wordpress.org/...es/class-appointment-model.php

plugins.trac.wordpress.org/...es/class-appointment-model.php

plugins.trac.wordpress.org/...es/class-appointment-model.php

plugins.trac.wordpress.org/.../td-util/class-td-db-model.php

cve.org (CVE-2026-1708)

nvd.nist.gov (CVE-2026-1708)

Download JSON