VYPR
High severity7.3NVD Advisory· Published Mar 13, 2025· Updated Apr 15, 2026

CVE-2025-1119

CVE-2025-1119

Description

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated arbitrary shortcode execution in Simply Schedule Appointments plugin for WordPress (≤1.6.8.5) via the customer_locale parameter, enabling code injection and stored XSS.

Vulnerability

Overview The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin for WordPress (all versions up to and including 1.6.8.5) is vulnerable to arbitrary shortcode execution. This stems from insufficient validation of the customer_locale parameter in the booking API endpoint, allowing an attacker to inject custom shortcode payloads that are passed directly to do_shortcode() without proper sanitization [1]. The flaw has been assigned CWE-94 (Code Injection) [1].

Exploitation

Details The attack can be carried out remotely without authentication, requiring only network access to the WordPress site. By manipulating the customer_locale parameter—expected to hold locale codes like "en_US" or "pt_BR"—an attacker can inject a crafted payload that escapes the expected context [1]. When the payload reaches the do_shortcode() function, it enables the execution of arbitrary WordPress shortcodes, including those that create administrative users, inject malicious content, or perform other actions the current user context (unauthenticated) allows [1]. Additionally, the same injection vector can lead to Stored Cross-Site Scripting (XSS) because the malicious shortcode output may persist in the database and execute in the browser of anyone viewing the appointment edit page [1].

Impact

Successful exploitation grants an unauthenticated attacker the ability to execute arbitrary shortcodes on the affected WordPress site. Depending on the shortcodes available, this can result in privilege escalation, data theft, or complete site compromise. The stored XSS component can also target site administrators, potentially leading to session hijacking or further persistent attacks [1].

Mitigation

The vendor has addressed this issue in version 1.6.8.6 of the plugin [1]. Users are strongly advised to update immediately. No workaround was publicly provided aside from upgrading [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

1

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.