VYPR
Medium severity4.4NVD Advisory· Published Feb 19, 2026· Updated Apr 15, 2026

CVE-2026-1044

CVE-2026-1044

Description

The Tennis Court Bookings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WordPress Tennis Court Bookings plugin (≤1.2.7) allows admin-level attackers to inject arbitrary scripts on multisite or multi-site or unfiltered_html-disabled sites.

The Tennis Court Bookings plugin for WordPress contains a Stored Cross-Site Scripting (XSS) vulnerability in its admin settings. It originates from insufficient input sanitization and output escaping, present in all versions up to and including 1.2.7 [1]. This flaw allows authenticated attackers with administrator-level permissions to inject arbitrary web scripts that execute whenever a user accesses an affected page [1].

Exploitation requires authentication and administrator-level access. The vulnerability only affects multi-site installations or environments where the unfiltered_html capability has been disabled [1]. Under these configurations, administrators can store malicious scripts in plugin settings that later execute for other users viewing those pages.

An attacker who exploits this vulnerability can perform actions such as session hijacking, defacement, or redirecting users to malicious sites, depending on the injected script [1]. Successful attacks compromise the integrity and confidentiality of the WordPress installation.

The plugin has been closed as of February 17, 2026 due to this security issue and is no longer available for download [1]. Users are advised to remove or replace the plugin to mitigate risk, as no patched version is provided [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.