CVE-2024-12047: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smartersite WP Compress – Instant Performance & Speed Optimization
CVE-2024-12047 is a reflected Cross-Site Scripting (XSS) vulnerability in the WP Compress – Instant Performance & Speed Optimization WordPress plugin affecting all versions up to 6. 30. 03. The flaw arises from improper sanitization and escaping of the 'custom_server' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS score is 6. 1 (medium severity), reflecting ease of exploitation without authentication but requiring user interaction. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential phishing or session hijacking attacks.
AI Analysis
Technical Summary
CVE-2024-12047 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the WP Compress – Instant Performance & Speed Optimization plugin for WordPress, developed by smartersite. The vulnerability affects all versions up to and including 6.30.03. It stems from insufficient input sanitization and output escaping of the 'custom_server' parameter, which is used during web page generation. An attacker can craft a malicious URL containing a payload in this parameter. When a victim clicks this URL, the injected script executes in their browser context, potentially allowing theft of cookies, session tokens, or other sensitive information, as well as manipulation of the displayed content. The vulnerability does not require authentication but does require user interaction (clicking a link). The CVSS 3.1 base score is 6.1, indicating a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is used to optimize WordPress site performance, so it is likely deployed on many websites globally, increasing the potential attack surface.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user data on affected WordPress sites. Successful exploitation can lead to theft of session cookies, enabling account hijacking, or manipulation of website content to conduct phishing or deliver malware. Although availability is not impacted, the reputational damage and loss of user trust can be significant for organizations. Since the plugin is designed for performance optimization, it is often used on high-traffic sites, increasing the risk of widespread exploitation. Attackers can leverage this vulnerability to target site visitors, potentially leading to broader compromise of user accounts or distribution of malicious payloads. The lack of authentication requirement lowers the barrier for attackers, but the need for user interaction limits automated exploitation. Organizations relying on this plugin without mitigation expose their users and themselves to these risks.
Mitigation Recommendations
Organizations should immediately update the WP Compress plugin to a patched version once available from the vendor. Until a patch is released, administrators can mitigate risk by implementing Web Application Firewall (WAF) rules that detect and block suspicious input patterns in the 'custom_server' parameter. Input validation and output encoding should be enforced at the application level if custom modifications are possible. Additionally, site owners should educate users about the risks of clicking unknown or suspicious links. Monitoring web server logs for unusual requests containing the 'custom_server' parameter can help detect attempted exploitation. Disabling or removing the plugin temporarily is a last-resort mitigation if patching or WAF rules are not feasible. Regular security audits and vulnerability scanning should be conducted to identify similar issues proactively.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, Brazil, France, Netherlands, Japan, Italy, Spain
CVE-2024-12047: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smartersite WP Compress – Instant Performance & Speed Optimization
Description
CVE-2024-12047 is a reflected Cross-Site Scripting (XSS) vulnerability in the WP Compress – Instant Performance & Speed Optimization WordPress plugin affecting all versions up to 6. 30. 03. The flaw arises from improper sanitization and escaping of the 'custom_server' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS score is 6. 1 (medium severity), reflecting ease of exploitation without authentication but requiring user interaction. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential phishing or session hijacking attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-12047 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the WP Compress – Instant Performance & Speed Optimization plugin for WordPress, developed by smartersite. The vulnerability affects all versions up to and including 6.30.03. It stems from insufficient input sanitization and output escaping of the 'custom_server' parameter, which is used during web page generation. An attacker can craft a malicious URL containing a payload in this parameter. When a victim clicks this URL, the injected script executes in their browser context, potentially allowing theft of cookies, session tokens, or other sensitive information, as well as manipulation of the displayed content. The vulnerability does not require authentication but does require user interaction (clicking a link). The CVSS 3.1 base score is 6.1, indicating a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is used to optimize WordPress site performance, so it is likely deployed on many websites globally, increasing the potential attack surface.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user data on affected WordPress sites. Successful exploitation can lead to theft of session cookies, enabling account hijacking, or manipulation of website content to conduct phishing or deliver malware. Although availability is not impacted, the reputational damage and loss of user trust can be significant for organizations. Since the plugin is designed for performance optimization, it is often used on high-traffic sites, increasing the risk of widespread exploitation. Attackers can leverage this vulnerability to target site visitors, potentially leading to broader compromise of user accounts or distribution of malicious payloads. The lack of authentication requirement lowers the barrier for attackers, but the need for user interaction limits automated exploitation. Organizations relying on this plugin without mitigation expose their users and themselves to these risks.
Mitigation Recommendations
Organizations should immediately update the WP Compress plugin to a patched version once available from the vendor. Until a patch is released, administrators can mitigate risk by implementing Web Application Firewall (WAF) rules that detect and block suspicious input patterns in the 'custom_server' parameter. Input validation and output encoding should be enforced at the application level if custom modifications are possible. Additionally, site owners should educate users about the risks of clicking unknown or suspicious links. Monitoring web server logs for unusual requests containing the 'custom_server' parameter can help detect attempted exploitation. Disabling or removing the plugin temporarily is a last-resort mitigation if patching or WAF rules are not feasible. Regular security audits and vulnerability scanning should be conducted to identify similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T18:38:18.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2bb7ef31ef0b5972b4
Added to database: 2/25/2026, 9:48:27 PM
Last enriched: 2/26/2026, 6:58:02 AM
Last updated: 2/26/2026, 8:25:53 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.