Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.2

WPBookit Plugin for WordPress Allows Attackers to Inject Malicious Scripts

CVE-2026-1945
Summary

The WPBookit plugin for WordPress is open to an attack where malicious code can be injected into a website. This can happen if a user visits a compromised page. To protect your website, update the WPBookit plugin to the latest version or uninstall it if you don't need it.

Original title
The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpb_user_name' and 'wpb_user_email' parameters in all versions up to, and including, 1.0.8 due to insufficien...
Original description
The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpb_user_name' and 'wpb_user_email' parameters in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1 7.2
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026