CVE-2024-12273: CWE-79 Cross-Site Scripting (XSS) in Unknown Calculated Fields Form
The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-12273 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Calculated Fields Form WordPress plugin versions prior to 5.2.62. This plugin allows users to create forms with dynamically calculated fields, commonly used for data collection and processing on WordPress sites. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being stored and rendered. This flaw enables high-privilege users, such as administrators, to inject malicious JavaScript code that is persistently stored and executed in the context of other users viewing the affected pages. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts HTML input to prevent such attacks. The vulnerability requires high privileges (admin-level access) and user interaction, as the malicious payload is triggered when a victim views the stored content. The CVSS 3.1 base score is 3.5 (low severity), reflecting limited confidentiality and integrity impacts, no availability impact, network attack vector, low attack complexity, and requirement for high privileges and user interaction. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security issue. The plugin is widely used in WordPress environments for form creation, and the vulnerability could be leveraged to execute arbitrary scripts, potentially leading to session hijacking, privilege escalation, or defacement within the scope of the affected site and user roles.
Potential Impact
For European organizations using the Calculated Fields Form plugin on WordPress sites, this vulnerability poses a moderate risk primarily to site integrity and user trust. Although exploitation requires administrator-level access, a compromised admin account or insider threat could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions within the site. This could affect internal portals, customer-facing websites, or intranet applications relying on this plugin. The impact on confidentiality and integrity is limited to the scope of the WordPress site and its users, with no direct availability impact. However, reputational damage and compliance risks (e.g., GDPR) could arise if user data is exposed or manipulated. The risk is heightened in multisite WordPress deployments common in large European enterprises and public sector organizations, where the usual HTML filtering restrictions may not prevent exploitation. Given the low CVSS score but the potential for persistent XSS, organizations should not dismiss this vulnerability, especially those with high-value web assets or sensitive user bases.
Mitigation Recommendations
To mitigate CVE-2024-12273 effectively, European organizations should take the following specific actions: 1) Immediately update the Calculated Fields Form plugin to version 5.2.62 or later once available, as this will include the necessary sanitization and escaping fixes. 2) Until a patch is applied, restrict administrative access to the WordPress backend strictly, enforcing strong authentication methods such as MFA and limiting admin accounts to trusted personnel only. 3) Review and audit all stored form settings and inputs created via the plugin for suspicious or unexpected scripts or HTML content, removing any potentially malicious entries. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected WordPress sites, reducing the impact of any injected code. 5) Monitor web server and application logs for unusual activity indicative of XSS exploitation attempts or privilege misuse. 6) In multisite environments, verify that user roles and capabilities are correctly assigned and consider additional filtering or input validation controls at the application or web application firewall (WAF) level. 7) Educate administrators about the risks of stored XSS and safe plugin configuration practices. These targeted measures go beyond generic patching advice and address the specific exploitation vectors and operational contexts of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2024-12273: CWE-79 Cross-Site Scripting (XSS) in Unknown Calculated Fields Form
Description
The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-12273 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Calculated Fields Form WordPress plugin versions prior to 5.2.62. This plugin allows users to create forms with dynamically calculated fields, commonly used for data collection and processing on WordPress sites. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being stored and rendered. This flaw enables high-privilege users, such as administrators, to inject malicious JavaScript code that is persistently stored and executed in the context of other users viewing the affected pages. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts HTML input to prevent such attacks. The vulnerability requires high privileges (admin-level access) and user interaction, as the malicious payload is triggered when a victim views the stored content. The CVSS 3.1 base score is 3.5 (low severity), reflecting limited confidentiality and integrity impacts, no availability impact, network attack vector, low attack complexity, and requirement for high privileges and user interaction. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security issue. The plugin is widely used in WordPress environments for form creation, and the vulnerability could be leveraged to execute arbitrary scripts, potentially leading to session hijacking, privilege escalation, or defacement within the scope of the affected site and user roles.
Potential Impact
For European organizations using the Calculated Fields Form plugin on WordPress sites, this vulnerability poses a moderate risk primarily to site integrity and user trust. Although exploitation requires administrator-level access, a compromised admin account or insider threat could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive data, or unauthorized actions within the site. This could affect internal portals, customer-facing websites, or intranet applications relying on this plugin. The impact on confidentiality and integrity is limited to the scope of the WordPress site and its users, with no direct availability impact. However, reputational damage and compliance risks (e.g., GDPR) could arise if user data is exposed or manipulated. The risk is heightened in multisite WordPress deployments common in large European enterprises and public sector organizations, where the usual HTML filtering restrictions may not prevent exploitation. Given the low CVSS score but the potential for persistent XSS, organizations should not dismiss this vulnerability, especially those with high-value web assets or sensitive user bases.
Mitigation Recommendations
To mitigate CVE-2024-12273 effectively, European organizations should take the following specific actions: 1) Immediately update the Calculated Fields Form plugin to version 5.2.62 or later once available, as this will include the necessary sanitization and escaping fixes. 2) Until a patch is applied, restrict administrative access to the WordPress backend strictly, enforcing strong authentication methods such as MFA and limiting admin accounts to trusted personnel only. 3) Review and audit all stored form settings and inputs created via the plugin for suspicious or unexpected scripts or HTML content, removing any potentially malicious entries. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected WordPress sites, reducing the impact of any injected code. 5) Monitor web server and application logs for unusual activity indicative of XSS exploitation attempts or privilege misuse. 6) In multisite environments, verify that user roles and capabilities are correctly assigned and consider additional filtering or input validation controls at the application or web application firewall (WAF) level. 7) Educate administrators about the risks of stored XSS and safe plugin configuration practices. These targeted measures go beyond generic patching advice and address the specific exploitation vectors and operational contexts of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-12-05T18:13:30.328Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef07b
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 11:19:46 PM
Last updated: 8/18/2025, 3:15:44 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.