CVE-2026-2262 PUBLISHED

Easy Appointments <= 3.12.21 - Unauthenticated Sensitive Information Exposure via REST API

Assigner: Wordfence
Reserved: 09.02.2026 Published: 17.04.2026 Updated: 17.04.2026

The Easy Appointments plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.12.21 via the /wp-json/wp/v2/eablocks/ea_appointments/ REST API endpoint. This is due to the endpoint being registered with 'permission_callback' => '__return_true', which allows access without any authentication or authorization checks. This makes it possible for unauthenticated attackers to extract sensitive customer appointment data including full names, email addresses, phone numbers, IP addresses, appointment descriptions, and pricing information.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor easyappointments
Product Easy Appointments
Versions Default: unaffected
  • affected from 0 to 3.12.21 (incl.)

Credits

  • MD. TAREQ AHAMED JONY finder

References

Problem Types

  • CWE-200 Exposure of Sensitive Information to an Unauthorized Actor CWE