Booked Scheduler 2.7.7 contains a directory traversal vulnerability in the manage_email_templates.php script that allows authenticated administrators to access unauthorized files. Attackers can exploit the vulnerable 'tn' parameter to read files outside the intended directory by manipulating directory path traversal techniques.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Twinkle Toes Software
Twinkle Toes Software booked Scheduler |
|
| Vendors & Products |
Twinkle Toes Software
Twinkle Toes Software booked Scheduler |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Booked Scheduler 2.7.7 contains a directory traversal vulnerability in the manage_email_templates.php script that allows authenticated administrators to access unauthorized files. Attackers can exploit the vulnerable 'tn' parameter to read files outside the intended directory by manipulating directory path traversal techniques. | |
| Title | Booked Scheduler 2.7.7 - Authenticated Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-03T22:01:44.235Z
Reserved: 2026-02-01T13:16:06.485Z
Link: CVE-2020-37077
No data.
Status : Received
Published: 2026-02-03T22:16:23.300
Modified: 2026-02-03T22:16:23.300
Link: CVE-2020-37077
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:44Z
Weaknesses