CVE-2023-2104: alextselegidis/easyappointments Improper Access Control vulnerability
5.4
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19033%
CWE
Published
4/15/2023
Updated
4/21/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| alextselegidis/easyappointments | composer | <= 1.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability was patched by adding role-based access control checks in the get_calendar_appointments method. The commit diff shows the original implementation did not filter appointments/unavailabilities by the current user's permissions. The function returned all entries regardless of ownership, enabling cross-provider data exposure. The added code in the patch explicitly filters results based on session user ID and role (provider/secretary), confirming this was the vulnerable entry point.