Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12240: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gpriday Page Builder by SiteOrigin

0
Medium
VulnerabilityCVE-2024-12240cvecve-2024-12240cwe-79
Published: Tue Jan 14 2025 (01/14/2025, 11:08:35 UTC)
Source: CVE Database V5
Vendor/Project: gpriday
Product: Page Builder by SiteOrigin

Description

CVE-2024-12240 is a stored cross-site scripting (XSS) vulnerability in the Page Builder by SiteOrigin WordPress plugin, affecting all versions up to 2. 31. 0. The flaw arises from improper sanitization and escaping of the 'row label' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4, indicating medium severity, and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects websites using WordPress with this plugin installed, which is common globally, especially in countries with high WordPress usage.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:58:20 UTC

Technical Analysis

CVE-2024-12240 is a stored cross-site scripting vulnerability identified in the Page Builder by SiteOrigin plugin for WordPress, affecting all versions up to and including 2.31.0. The vulnerability stems from improper neutralization of input during web page generation, specifically through the 'row label' parameter. Authenticated attackers with Contributor-level permissions or higher can inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The vulnerability does not require user interaction beyond visiting the page and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, indicating improper input sanitization and output escaping in web applications. Given the widespread use of WordPress and the popularity of SiteOrigin's Page Builder plugin, this vulnerability poses a significant risk to many websites globally.

Potential Impact

The impact of CVE-2024-12240 is primarily on the confidentiality and integrity of affected websites and their users. Exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, defacement, or distribution of malware. Since the vulnerability requires authenticated access at Contributor level or above, it limits exploitation to users who already have some level of trust or access, but this is common in multi-user WordPress environments such as editorial teams or contributors. The scope change means that the attacker can affect other users beyond themselves, increasing the risk to site visitors and administrators. While availability is not directly impacted, the trustworthiness and security posture of the website can be severely undermined. Organizations relying on this plugin for content management and page building may face reputational damage, data breaches, and compliance issues if exploited.

Mitigation Recommendations

To mitigate CVE-2024-12240, organizations should first check for and apply any official patches or updates from SiteOrigin as soon as they become available. In the absence of patches, administrators should restrict Contributor-level access to trusted users only and review user roles and permissions to minimize risk. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injections targeting the 'row label' parameter can provide temporary protection. Additionally, site owners should enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly audit and sanitize user-generated content, especially from users with elevated privileges. Monitoring logs for unusual activity related to page edits or script injections can help detect exploitation attempts early. Finally, educating content contributors about safe input practices and the risks of injecting scripts can reduce accidental exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-05T12:59:12.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e33b7ef31ef0b597a0a

Added to database: 2/25/2026, 9:48:35 PM

Last enriched: 2/26/2026, 5:58:20 AM

Last updated: 2/26/2026, 9:31:12 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats