CVE-2026-1708 PUBLISHED

Appointment Booking Calendar <= 1.6.9.27 - Unauthenticated SQL Injection via 'append_where_sql' Parameter

Assigner: Wordfence
Reserved: 30.01.2026 Published: 11.03.2026 Updated: 11.03.2026

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the db_where_conditions method in the TD_DB_Model class failing to prevent the append_where_sql parameter from being passed through JSON request bodies, while only checking for its presence in the $_REQUEST superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the append_where_sql parameter in JSON payloads granted they have obtained a valid public_token that is inadvertently exposed during the booking flow.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor croixhaug
Product Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
Versions Default: unaffected
  • affected from * to 1.6.9.27 (incl.)

Credits

  • Thanh Hao finder

References

Problem Types

  • CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE