VYPR
Unrated severityNVD Advisory· Published May 24, 2026

calcom cal.diy Generic React API bookings-single-view.getServerSideProps.tsx getServerSideProps information disclosure

CVE-2026-9349

Description

A vulnerability was determined in calcom cal.diy up to 4.9.4. Affected by this issue is the function getServerSideProps of the file apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx of the component Generic React API. This manipulation of the argument cancelledBy/rescheduledBy causes information disclosure. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cal.com (cal.diy) up to 4.9.4 leaks organizer email via cancelledBy/rescheduledBy properties, bypassing the hideOrganizerEmail feature.

Vulnerability

In cal.com/cal.diy up to version 4.9.4, the getServerSideProps function in apps/web/modules/bookings/views/bookings-single-view.getServerSideProps.tsx and the corresponding TRPC handler fail to sanitize the cancelledBy and rescheduledBy properties of the bookingInfo payload. When the hideOrganizerEmail privacy setting is enabled, the organizer's email is still exposed through these properties, leading to information disclosure [1].

Exploitation

An unauthenticated attacker can remotely trigger the vulnerability by accessing a booking page (e.g., /booking/[uid]). When an organizer cancels or reschedules a booking, the raw email address of the organizer is included in the server-side rendered (SSR) page payload and TRPC API responses. No authentication or special privileges are required beyond knowledge of a valid booking UID [1].

Impact

Successful exploitation allows an attacker to retrieve the private email address of an event organizer who has explicitly enabled the hideOrganizerEmail protection. This compromises user privacy and may enable further targeted attacks such as phishing or social engineering [1].

Mitigation

As of the publication date, no official fix is available. The vendor was contacted but did not respond. Users are advised to disable the hideOrganizerEmail feature as a temporary workaround, or manually apply sanitization to the cancelledBy and rescheduledBy fields in the codebase. The vulnerability is publicly known and may be actively exploited [1].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.