CVE-2024-12395: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amitwpdeveloper WooCommerce Additional Fees On Checkout (Free)
CVE-2024-12395 is a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) WordPress plugin, affecting all versions up to 1. 4. 7. The flaw arises from improper input sanitization and output escaping of the 'number' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability can compromise user confidentiality and integrity by stealing session cookies or performing actions on behalf of the user. The CVSS score is 6. 1 (medium severity), reflecting network attack vector, no privileges required, but user interaction needed. No known exploits are currently reported in the wild. Organizations using this plugin in their WooCommerce-based e-commerce sites should prioritize patching or applying mitigations to prevent potential attacks.
AI Analysis
Technical Summary
CVE-2024-12395 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) plugin for WordPress, versions up to and including 1.4.7. The vulnerability stems from improper neutralization of user-supplied input in the 'number' parameter during web page generation, specifically insufficient input sanitization and output escaping. This allows an unauthenticated attacker to craft malicious URLs containing JavaScript payloads that, when clicked by a victim, execute in the context of the victim's browser session. The attack vector is network-based, requiring no privileges but necessitating user interaction. The vulnerability impacts confidentiality and integrity by enabling theft of sensitive data such as session cookies or performing unauthorized actions on behalf of the user. The scope is limited to sites using this specific WooCommerce plugin, which is a popular e-commerce extension for WordPress. No patches are currently linked, and no known exploits have been observed in the wild, but the risk remains significant due to the widespread use of WooCommerce plugins. The CVSS v3.1 score of 6.1 reflects medium severity, with a vector indicating network attack, low complexity, no privileges required, user interaction required, and a scope change due to potential impact on user sessions. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. Organizations running WooCommerce with this plugin should monitor for updates and consider interim mitigations such as input validation, output encoding, and web application firewall rules.
Potential Impact
The primary impact of CVE-2024-12395 is the compromise of user confidentiality and integrity on affected e-commerce websites. Successful exploitation allows attackers to execute arbitrary scripts in the context of a victim's browser, potentially leading to session hijacking, theft of personal or payment information, and unauthorized actions such as changing user settings or placing fraudulent orders. While availability is not directly affected, the reputational damage and loss of customer trust can have significant business consequences. For organizations worldwide, especially those relying on WooCommerce for online sales, this vulnerability increases the risk of targeted phishing campaigns and automated attacks exploiting the reflected XSS flaw. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, particularly in phishing-prone environments. The vulnerability could also be leveraged as a stepping stone for more complex attacks, including privilege escalation or persistent XSS if combined with other flaws. Overall, the threat undermines the security posture of e-commerce platforms, potentially leading to financial losses and regulatory compliance issues related to data protection.
Mitigation Recommendations
To mitigate CVE-2024-12395, organizations should first monitor the plugin vendor's channels for an official patch and apply it promptly once available. Until a patch is released, administrators can implement several practical measures: 1) Employ a Web Application Firewall (WAF) with rules specifically designed to detect and block reflected XSS payloads targeting the 'number' parameter or similar inputs. 2) Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of injected scripts. 3) Conduct manual code reviews or apply custom input validation and output encoding in the plugin's codebase if feasible, sanitizing the 'number' parameter to allow only expected numeric input. 4) Educate users and staff about the risks of clicking suspicious links, especially those received via email or social media. 5) Regularly audit and monitor web server logs for unusual query parameters or repeated attempts to exploit XSS vectors. 6) Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices. These steps, combined, reduce the attack surface and limit the potential for successful exploitation.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-12395: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amitwpdeveloper WooCommerce Additional Fees On Checkout (Free)
Description
CVE-2024-12395 is a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) WordPress plugin, affecting all versions up to 1. 4. 7. The flaw arises from improper input sanitization and output escaping of the 'number' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability can compromise user confidentiality and integrity by stealing session cookies or performing actions on behalf of the user. The CVSS score is 6. 1 (medium severity), reflecting network attack vector, no privileges required, but user interaction needed. No known exploits are currently reported in the wild. Organizations using this plugin in their WooCommerce-based e-commerce sites should prioritize patching or applying mitigations to prevent potential attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-12395 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) plugin for WordPress, versions up to and including 1.4.7. The vulnerability stems from improper neutralization of user-supplied input in the 'number' parameter during web page generation, specifically insufficient input sanitization and output escaping. This allows an unauthenticated attacker to craft malicious URLs containing JavaScript payloads that, when clicked by a victim, execute in the context of the victim's browser session. The attack vector is network-based, requiring no privileges but necessitating user interaction. The vulnerability impacts confidentiality and integrity by enabling theft of sensitive data such as session cookies or performing unauthorized actions on behalf of the user. The scope is limited to sites using this specific WooCommerce plugin, which is a popular e-commerce extension for WordPress. No patches are currently linked, and no known exploits have been observed in the wild, but the risk remains significant due to the widespread use of WooCommerce plugins. The CVSS v3.1 score of 6.1 reflects medium severity, with a vector indicating network attack, low complexity, no privileges required, user interaction required, and a scope change due to potential impact on user sessions. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. Organizations running WooCommerce with this plugin should monitor for updates and consider interim mitigations such as input validation, output encoding, and web application firewall rules.
Potential Impact
The primary impact of CVE-2024-12395 is the compromise of user confidentiality and integrity on affected e-commerce websites. Successful exploitation allows attackers to execute arbitrary scripts in the context of a victim's browser, potentially leading to session hijacking, theft of personal or payment information, and unauthorized actions such as changing user settings or placing fraudulent orders. While availability is not directly affected, the reputational damage and loss of customer trust can have significant business consequences. For organizations worldwide, especially those relying on WooCommerce for online sales, this vulnerability increases the risk of targeted phishing campaigns and automated attacks exploiting the reflected XSS flaw. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, particularly in phishing-prone environments. The vulnerability could also be leveraged as a stepping stone for more complex attacks, including privilege escalation or persistent XSS if combined with other flaws. Overall, the threat undermines the security posture of e-commerce platforms, potentially leading to financial losses and regulatory compliance issues related to data protection.
Mitigation Recommendations
To mitigate CVE-2024-12395, organizations should first monitor the plugin vendor's channels for an official patch and apply it promptly once available. Until a patch is released, administrators can implement several practical measures: 1) Employ a Web Application Firewall (WAF) with rules specifically designed to detect and block reflected XSS payloads targeting the 'number' parameter or similar inputs. 2) Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of injected scripts. 3) Conduct manual code reviews or apply custom input validation and output encoding in the plugin's codebase if feasible, sanitizing the 'number' parameter to allow only expected numeric input. 4) Educate users and staff about the risks of clicking suspicious links, especially those received via email or social media. 5) Regularly audit and monitor web server logs for unusual query parameters or repeated attempts to exploit XSS vectors. 6) Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices. These steps, combined, reduce the attack surface and limit the potential for successful exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-09T23:17:18.385Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e38b7ef31ef0b5980c8
Added to database: 2/25/2026, 9:48:40 PM
Last enriched: 2/26/2026, 5:12:41 AM
Last updated: 2/26/2026, 7:58:53 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.