Skip to content
Threat Feed
high advisory

Fluent Booking WordPress Plugin Stored XSS Vulnerability

The Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.

CVE-2026-2231 describes a stored cross-site scripting (XSS) vulnerability within the Fluent Booking WordPress plugin. This vulnerability affects all versions up to and including 2.0.01. The root cause is insufficient input sanitization and output escaping of multiple parameters handled by the plugin. An unauthenticated attacker can exploit this vulnerability to inject malicious JavaScript code into the WordPress site. The injected script executes in the context of the victim’s browser when they access the page containing the injected code, potentially leading to session hijacking, defacement, or other malicious activities. Successful exploitation grants the attacker the same privileges as the victim user.

Attack Chain

  1. An unauthenticated attacker identifies a vulnerable parameter within the Fluent Booking plugin, specifically related to booking data.
  2. The attacker crafts a malicious payload containing JavaScript code.
  3. The attacker submits a request to the WordPress site with the crafted payload embedded within the vulnerable parameter (e.g., booking name, location, or other fields).
  4. The WordPress server stores the malicious payload in the database due to insufficient sanitization.
  5. A legitimate user (e.g., an administrator or another user viewing bookings) accesses a page displaying the stored booking data.
  6. The malicious JavaScript code embedded in the booking data is rendered in the user’s browser.
  7. The injected script executes in the context of the user’s session.
  8. The attacker can potentially steal cookies, redirect the user to a malicious website, or perform other actions with the user’s privileges.

Impact

Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in user’s browser. This can lead to account compromise, including administrator accounts, potentially leading to full control of the WordPress website. Website defacement, data theft, and redirection to phishing sites are also potential impacts. Given the widespread use of WordPress and the Fluent Booking plugin, a successful widespread exploit could affect a large number of websites.

Recommendation

  • Upgrade the Fluent Booking plugin to a version greater than 2.0.01 to patch CVE-2026-2231.
  • Deploy the Sigma rule Detect Suspicious URI Parameters in WordPress to detect potential XSS attempts against WordPress sites.
  • Monitor web server logs for suspicious URI parameters and user input, as detected by the Detect WordPress XSS via URI Parameters Sigma rule.
  • Implement a web application firewall (WAF) with rules to filter out common XSS payloads.
  • Regularly audit and sanitize user input within WordPress plugins and themes to prevent stored XSS vulnerabilities.

Detection coverage 2

Detect Suspicious URI Parameters in WordPress

high

Detects potential XSS attempts in URI parameters targeting WordPress sites by looking for common XSS payloads.

sigma tactics: initial_access techniques: T1189 sources: webserver, linux

Detect WordPress XSS via URI Parameters

medium

Detects attempts to exploit XSS vulnerabilities in WordPress through URI parameters. This rule identifies common injection patterns in cs-uri-query.

sigma tactics: initial_access techniques: T1189 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →