calcom cal.diy Generic React API bookings-single-view.getServerSideProps.tsx getServerSideProps information disclosure
Description
A vulnerability was determined in calcom cal.diy up to 4.9.4. Affected by this issue is the function getServerSideProps of the file apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx of the component Generic React API. This manipulation of the argument cancelledBy/rescheduledBy causes information disclosure. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cal.com (cal.diy) up to 4.9.4 leaks organizer email via cancelledBy/rescheduledBy properties, bypassing the hideOrganizerEmail feature.
Vulnerability
In cal.com/cal.diy up to version 4.9.4, the getServerSideProps function in apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx and the corresponding TRPC handler fail to sanitize the cancelledBy and rescheduledBy properties of the bookingInfo payload. When the hideOrganizerEmail privacy setting is enabled, the organizer's email is still exposed through these properties, leading to information disclosure [1].
Exploitation
An unauthenticated attacker can remotely trigger the vulnerability by accessing a booking page (e.g., /booking/[uid]). When an organizer cancels or reschedules a booking, the raw email address of the organizer is included in the server-side rendered (SSR) page payload and TRPC API responses. No authentication or special privileges are required beyond knowledge of a valid booking UID [1].
Impact
Successful exploitation allows an attacker to retrieve the private email address of an event organizer who has explicitly enabled the hideOrganizerEmail protection. This compromises user privacy and may enable further targeted attacks such as phishing or social engineering [1].
Mitigation
As of the publication date, no official fix is available. The vendor was contacted but did not respond. Users are advised to disable the hideOrganizerEmail feature as a temporary workaround, or manually apply sanitization to the cancelledBy and rescheduledBy fields in the codebase. The vulnerability is publicly known and may be actively exploited [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- gist.github.com/YLChen-007/b59c44d1550c4b0f373ca4eb1c150994mitreexploit
- vuldb.com/submit/812177mitrethird-party-advisory
- vuldb.com/vuln/365312mitrevdb-entrytechnical-description
- vuldb.com/vuln/365312/ctimitresignaturepermissions-required
News mentions
0No linked articles in our index yet.