Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12395: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amitwpdeveloper WooCommerce Additional Fees On Checkout (Free)

0
Medium
VulnerabilityCVE-2024-12395cvecve-2024-12395cwe-79
Published: Tue Dec 17 2024 (12/17/2024, 11:10:18 UTC)
Source: CVE Database V5
Vendor/Project: amitwpdeveloper
Product: WooCommerce Additional Fees On Checkout (Free)

Description

CVE-2024-12395 is a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) WordPress plugin, affecting all versions up to 1. 4. 7. The flaw arises from improper input sanitization and output escaping of the 'number' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This vulnerability can compromise user confidentiality and integrity by stealing session cookies or performing actions on behalf of the user. The CVSS score is 6. 1 (medium severity), reflecting network attack vector, no privileges required, but user interaction needed. No known exploits are currently reported in the wild. Organizations using this plugin in their WooCommerce-based e-commerce sites should prioritize patching or applying mitigations to prevent potential attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:12:41 UTC

Technical Analysis

CVE-2024-12395 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout (Free) plugin for WordPress, versions up to and including 1.4.7. The vulnerability stems from improper neutralization of user-supplied input in the 'number' parameter during web page generation, specifically insufficient input sanitization and output escaping. This allows an unauthenticated attacker to craft malicious URLs containing JavaScript payloads that, when clicked by a victim, execute in the context of the victim's browser session. The attack vector is network-based, requiring no privileges but necessitating user interaction. The vulnerability impacts confidentiality and integrity by enabling theft of sensitive data such as session cookies or performing unauthorized actions on behalf of the user. The scope is limited to sites using this specific WooCommerce plugin, which is a popular e-commerce extension for WordPress. No patches are currently linked, and no known exploits have been observed in the wild, but the risk remains significant due to the widespread use of WooCommerce plugins. The CVSS v3.1 score of 6.1 reflects medium severity, with a vector indicating network attack, low complexity, no privileges required, user interaction required, and a scope change due to potential impact on user sessions. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. Organizations running WooCommerce with this plugin should monitor for updates and consider interim mitigations such as input validation, output encoding, and web application firewall rules.

Potential Impact

The primary impact of CVE-2024-12395 is the compromise of user confidentiality and integrity on affected e-commerce websites. Successful exploitation allows attackers to execute arbitrary scripts in the context of a victim's browser, potentially leading to session hijacking, theft of personal or payment information, and unauthorized actions such as changing user settings or placing fraudulent orders. While availability is not directly affected, the reputational damage and loss of customer trust can have significant business consequences. For organizations worldwide, especially those relying on WooCommerce for online sales, this vulnerability increases the risk of targeted phishing campaigns and automated attacks exploiting the reflected XSS flaw. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, particularly in phishing-prone environments. The vulnerability could also be leveraged as a stepping stone for more complex attacks, including privilege escalation or persistent XSS if combined with other flaws. Overall, the threat undermines the security posture of e-commerce platforms, potentially leading to financial losses and regulatory compliance issues related to data protection.

Mitigation Recommendations

To mitigate CVE-2024-12395, organizations should first monitor the plugin vendor's channels for an official patch and apply it promptly once available. Until a patch is released, administrators can implement several practical measures: 1) Employ a Web Application Firewall (WAF) with rules specifically designed to detect and block reflected XSS payloads targeting the 'number' parameter or similar inputs. 2) Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of injected scripts. 3) Conduct manual code reviews or apply custom input validation and output encoding in the plugin's codebase if feasible, sanitizing the 'number' parameter to allow only expected numeric input. 4) Educate users and staff about the risks of clicking suspicious links, especially those received via email or social media. 5) Regularly audit and monitor web server logs for unusual query parameters or repeated attempts to exploit XSS vectors. 6) Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices. These steps, combined, reduce the attack surface and limit the potential for successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-09T23:17:18.385Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e38b7ef31ef0b5980c8

Added to database: 2/25/2026, 9:48:40 PM

Last enriched: 2/26/2026, 5:12:41 AM

Last updated: 2/26/2026, 7:58:53 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats