Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12325: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Waymark

0
Medium
VulnerabilityCVE-2024-12325cvecve-2024-12325cwe-79
Published: Wed Dec 11 2024 (12/11/2024, 11:24:48 UTC)
Source: CVE Database V5
Vendor/Project: morehawes
Product: Waymark

Description

CVE-2024-12325 is a reflected Cross-Site Scripting (XSS) vulnerability in the Waymark WordPress plugin up to version 1. 4. 1. It arises from improper input sanitization and output escaping of the 'content' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity) and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using the Waymark plugin should prioritize patching or mitigating this issue to prevent potential phishing, session hijacking, or other client-side attacks. Countries with significant WordPress usage and digital presence are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:28:12 UTC

Technical Analysis

CVE-2024-12325 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Waymark plugin for WordPress, developed by morehawes. This vulnerability affects all versions up to and including 1.4.1. The root cause is insufficient sanitization and escaping of user-supplied input in the 'content' parameter during web page generation. Because of this, an attacker can craft a malicious URL containing a script payload in the 'content' parameter. When a victim clicks this URL, the injected script executes in the context of the victim's browser session on the affected site. This type of XSS is classified under CWE-79, which involves improper neutralization of input during web page generation. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) such as clicking a link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). The vulnerability was published on December 11, 2024, with no known exploits in the wild at this time. The lack of patches or updates linked suggests that mitigation may require manual intervention or updates from the vendor. Given the widespread use of WordPress and its plugins, this vulnerability poses a risk to websites using Waymark for content management or display.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the browsers of users visiting vulnerable Waymark-enabled WordPress sites. This can lead to theft of sensitive information such as session cookies, enabling session hijacking, unauthorized actions on behalf of users, or redirection to malicious sites. While the vulnerability does not directly affect server availability or integrity, the compromise of user sessions and data confidentiality can damage organizational reputation, lead to data breaches, and facilitate further attacks such as phishing or malware distribution. Since the attack requires user interaction, the scope of impact depends on the ability of attackers to lure users into clicking malicious links. Organizations with high traffic websites or those handling sensitive user data are at greater risk. The reflected nature of the XSS means it can be exploited via phishing campaigns or maliciously crafted URLs shared externally. The medium CVSS score reflects moderate severity but should not be underestimated given the potential for cascading impacts on user trust and data security.

Mitigation Recommendations

Organizations should immediately verify if their WordPress installations use the Waymark plugin and identify the version in use. If an updated, patched version is released by the vendor, apply it promptly. In the absence of an official patch, implement web application firewall (WAF) rules to detect and block suspicious requests containing script payloads in the 'content' parameter. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. Educate users and administrators about the risks of clicking untrusted links, especially those purporting to come from the organization. Review and harden input validation and output encoding practices in custom code or plugin extensions. Monitor web server logs for unusual query parameters or patterns indicative of exploitation attempts. Consider disabling or replacing the Waymark plugin if immediate patching is not feasible. Regularly audit all WordPress plugins for vulnerabilities and maintain an up-to-date inventory to facilitate rapid response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T20:08:41.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e37b7ef31ef0b597edc

Added to database: 2/25/2026, 9:48:39 PM

Last enriched: 2/26/2026, 5:28:12 AM

Last updated: 2/26/2026, 11:00:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats