CVE-2024-12467: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in grafreak Pago por Redsys
CVE-2024-12467 is a reflected Cross-Site Scripting (XSS) vulnerability in the Pago por Redsys WordPress plugin up to version 1. 0. 12. It arises from improper sanitization and escaping of the 'Ds_MerchantParameters' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This can result in partial compromise of user confidentiality and integrity, such as session hijacking or phishing. The vulnerability has a CVSS score of 6. 1 (medium severity) and does not require authentication but does require user interaction. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential attacks.
AI Analysis
Technical Summary
CVE-2024-12467 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Pago por Redsys plugin for WordPress, affecting all versions up to and including 1.0.12. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and output escaping of the 'Ds_MerchantParameters' parameter. This parameter is used in the plugin's processing of payment-related data. Because the plugin fails to properly validate or encode this input, an attacker can craft a malicious URL containing JavaScript code within this parameter. When a victim clicks the malicious link, the injected script executes in the context of the victim's browser, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks. The vulnerability is exploitable remotely without authentication but requires user interaction (clicking a link). The CVSS 3.1 base score is 6.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No public exploits are currently known, but the vulnerability poses a significant risk to websites using this plugin, especially those handling sensitive payment information. The reflected nature of the XSS limits automated exploitation but still presents a meaningful threat vector for targeted attacks or phishing campaigns.
Potential Impact
The primary impact of CVE-2024-12467 is the compromise of user confidentiality and integrity through reflected XSS attacks. Attackers can steal session cookies, enabling account hijacking, or inject malicious scripts that perform unauthorized actions on behalf of the user. This can lead to phishing, data theft, or manipulation of payment processes. Since the vulnerability affects a payment plugin, successful exploitation could undermine trust in e-commerce transactions and potentially expose sensitive financial data indirectly. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate the risk of targeted attacks against customers or administrators. Organizations running WordPress sites with this plugin may face reputational damage, regulatory compliance issues, and financial losses if exploited. The vulnerability does not affect system availability directly but can facilitate further attacks that degrade security posture.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update the Pago por Redsys plugin to a version that addresses this vulnerability once released by the vendor. If no patch is available, consider temporarily disabling the plugin or replacing it with an alternative payment solution. 2. Input validation and output encoding: Developers should implement strict server-side validation and proper output escaping for the 'Ds_MerchantParameters' parameter to prevent script injection. 3. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block malicious payloads targeting the vulnerable parameter. 4. User awareness: Educate users and administrators to avoid clicking suspicious links, especially those purporting to be related to payment processing. 5. Content Security Policy (CSP): Implement CSP headers to restrict the execution of unauthorized scripts in the browser. 6. Monitor logs: Regularly review web server and application logs for unusual requests containing suspicious parameters. 7. Harden WordPress security: Employ security plugins that provide XSS protection and keep WordPress core and all plugins up to date. 8. Incident response: Prepare to respond quickly to any signs of exploitation, including session hijacking or phishing attempts linked to this vulnerability.
Affected Countries
Spain, Mexico, Argentina, Colombia, Chile, Peru, United States, United Kingdom, Germany, France, Italy
CVE-2024-12467: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in grafreak Pago por Redsys
Description
CVE-2024-12467 is a reflected Cross-Site Scripting (XSS) vulnerability in the Pago por Redsys WordPress plugin up to version 1. 0. 12. It arises from improper sanitization and escaping of the 'Ds_MerchantParameters' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This can result in partial compromise of user confidentiality and integrity, such as session hijacking or phishing. The vulnerability has a CVSS score of 6. 1 (medium severity) and does not require authentication but does require user interaction. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-12467 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Pago por Redsys plugin for WordPress, affecting all versions up to and including 1.0.12. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and output escaping of the 'Ds_MerchantParameters' parameter. This parameter is used in the plugin's processing of payment-related data. Because the plugin fails to properly validate or encode this input, an attacker can craft a malicious URL containing JavaScript code within this parameter. When a victim clicks the malicious link, the injected script executes in the context of the victim's browser, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks. The vulnerability is exploitable remotely without authentication but requires user interaction (clicking a link). The CVSS 3.1 base score is 6.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No public exploits are currently known, but the vulnerability poses a significant risk to websites using this plugin, especially those handling sensitive payment information. The reflected nature of the XSS limits automated exploitation but still presents a meaningful threat vector for targeted attacks or phishing campaigns.
Potential Impact
The primary impact of CVE-2024-12467 is the compromise of user confidentiality and integrity through reflected XSS attacks. Attackers can steal session cookies, enabling account hijacking, or inject malicious scripts that perform unauthorized actions on behalf of the user. This can lead to phishing, data theft, or manipulation of payment processes. Since the vulnerability affects a payment plugin, successful exploitation could undermine trust in e-commerce transactions and potentially expose sensitive financial data indirectly. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate the risk of targeted attacks against customers or administrators. Organizations running WordPress sites with this plugin may face reputational damage, regulatory compliance issues, and financial losses if exploited. The vulnerability does not affect system availability directly but can facilitate further attacks that degrade security posture.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update the Pago por Redsys plugin to a version that addresses this vulnerability once released by the vendor. If no patch is available, consider temporarily disabling the plugin or replacing it with an alternative payment solution. 2. Input validation and output encoding: Developers should implement strict server-side validation and proper output escaping for the 'Ds_MerchantParameters' parameter to prevent script injection. 3. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block malicious payloads targeting the vulnerable parameter. 4. User awareness: Educate users and administrators to avoid clicking suspicious links, especially those purporting to be related to payment processing. 5. Content Security Policy (CSP): Implement CSP headers to restrict the execution of unauthorized scripts in the browser. 6. Monitor logs: Regularly review web server and application logs for unusual requests containing suspicious parameters. 7. Harden WordPress security: Employ security plugins that provide XSS protection and keep WordPress core and all plugins up to date. 8. Incident response: Prepare to respond quickly to any signs of exploitation, including session hijacking or phishing attempts linked to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-10T22:17:16.431Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e3eb7ef31ef0b59b7cd
Added to database: 2/25/2026, 9:48:46 PM
Last enriched: 2/26/2026, 4:28:11 AM
Last updated: 2/26/2026, 9:35:51 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.