CVE-2024-51873
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masashi Takizawa Multi-day Booking Calendar multi-day-booking-calendar allows DOM-Based XSS.This issue affects Multi-day Booking Calendar: from n/a through <= 1.0.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
DOM-Based XSS vulnerability in WordPress Multi-day Booking Calendar plugin <=1.0.1 allows attackers to inject malicious scripts via crafted input, requiring user interaction.
Vulnerability
Overview
The Multi-day Booking Calendar plugin for WordPress (versions up to and including 1.0.1) contains a DOM-Based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary JavaScript that executes in the browser context of a victim user [1].
Exploitation
Details
Exploitation requires a privileged user (such as an administrator) to perform an action like clicking a malicious link, visiting a crafted page, or submitting a specially crafted form. Because the vulnerability is DOM-based, the payload is executed client-side after the page loads, bypassing server-side filters [1]. The attack does not require direct network access to the server but relies on social engineering to trigger the malicious action.
Impact
Successful exploitation allows an attacker to inject malicious scripts, which can be used to redirect visitors to malicious sites, display unwanted advertisements, steal session cookies, or perform other actions within the context of the affected site. The reference notes that such vulnerabilities are frequently used in mass-exploit campaigns targeting thousands of WordPress sites [1].
Mitigation
The vendor has not released a patched version beyond 1.0.1, so users are advised to update the plugin to the latest available version. If an update is not possible, immediate action such as disabling the plugin or seeking assistance from a hosting provider or web developer is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.