Description
Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.
Published: 2026-01-15
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation through CSRF leading to administrative takeover
Action: Patch Immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-54v4-4685-vwrj alextselegidis/easyappointments is Vulnerable to CSRF Protection Bypass
History

Wed, 28 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Easyappointments
Easyappointments easy\!appointments
CPEs cpe:2.3:a:easyappointments:easy\!appointments:*:*:*:*:*:-:*:*
Vendors & Products Easyappointments
Easyappointments easy\!appointments
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Alextselegidis
Alextselegidis easyappointments
Vendors & Products Alextselegidis
Alextselegidis easyappointments

Thu, 15 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.
Title CSRF Protection Bypass: Sensitive endpoints accept GET requests, enabling admin account takeover
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Alextselegidis Easyappointments
Easyappointments Easy\!appointments
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-15T21:34:43.098Z

Reserved: 2026-01-14T16:08:37.482Z

Link: CVE-2026-23622

cve-icon Vulnrichment

Updated: 2026-01-15T21:34:14.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T20:16:05.773

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-23622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:15:04Z

Weaknesses