The plugin does not sanitise some of its parameters, which could allow low privilege users such as author to perform XSS attacks against frontend and backend users when viewing the related event/s
Create an event with the following payload in the description of a timeslot: <img src onerror=alert(/XSS/)> The XSS will be executed in the frontend and backend when viewing the related event
Martin Vierula of Trustwave
Yes
2021-08-23 (about 10 months ago)
2021-08-23 (about 10 months ago)
2022-04-24 (about 2 months ago)