Cross-site Request Forgery (CSRF) Affecting alextselegidis/easyappointments package, versions >=1.1.0-beta.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ALEXTSELEGIDISEASYAPPOINTMENTS-15010765
  • published16 Jan 2026
  • disclosed15 Jan 2026
  • creditFaroukN

Introduced: 15 Jan 2026

CVE-2026-23622  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for alextselegidis/easyappointments.

Overview

alextselegidis/easyappointments is a powerful Open Source Appointment Scheduler that can be installed on your server.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the csrf_verify() function, which only enforces checks for POST requests and returns early for other methods. An attacker can gain unauthorized administrative access and modify sensitive account information by tricking a victim into visiting a crafted URL that issues a GET request to state-changing endpoints.

References

CVSS Base Scores

version 4.0
version 3.1