Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12469: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in puckrobin WP BASE Booking of Appointments, Services and Events

0
Medium
VulnerabilityCVE-2024-12469cvecve-2024-12469cwe-79
Published: Tue Dec 17 2024 (12/17/2024, 09:22:42 UTC)
Source: CVE Database V5
Vendor/Project: puckrobin
Product: WP BASE Booking of Appointments, Services and Events

Description

CVE-2024-12469 is a reflected Cross-Site Scripting (XSS) vulnerability in the WP BASE Booking of Appointments, Services and Events WordPress plugin, affecting all versions up to 4. 9. 1. The flaw arises from improper input sanitization and output escaping of the 'status' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity) and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites are at risk of session hijacking, credential theft, or unauthorized actions via injected scripts. Mitigation involves applying patches when available, implementing strict input validation, and employing Web Application Firewalls (WAFs) to detect and block malicious payloads.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:27:42 UTC

Technical Analysis

CVE-2024-12469 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP BASE Booking of Appointments, Services and Events plugin for WordPress, versions up to and including 4.9.1. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'status' parameter. This allows unauthenticated attackers to craft malicious URLs containing JavaScript payloads that execute in the context of a victim's browser when they click the link. The attack vector is remote and requires no authentication, but user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality and integrity by enabling theft of session cookies, credentials, or execution of unauthorized actions on behalf of the user. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No public exploits have been reported yet, but the widespread use of WordPress and this plugin increases the risk of exploitation. The vulnerability is classified under CWE-79, a common web application security weakness related to Cross-Site Scripting. The lack of patches at the time of reporting necessitates immediate mitigation steps by administrators.

Potential Impact

The vulnerability allows attackers to execute arbitrary JavaScript in the context of users visiting affected WordPress sites using the vulnerable plugin. This can lead to session hijacking, theft of sensitive information such as authentication tokens or personal data, and unauthorized actions performed on behalf of the user. For organizations, this could result in compromised user accounts, data breaches, reputational damage, and potential regulatory penalties. Since the plugin is used for booking appointments, services, and events, attackers could manipulate booking data or redirect users to malicious sites. The attack requires user interaction but no authentication, making it feasible to target site visitors broadly through phishing or social engineering. Although availability is not impacted, the confidentiality and integrity risks are significant, especially for businesses relying on this plugin for customer interactions and transactions.

Mitigation Recommendations

Administrators should monitor for plugin updates and apply patches promptly once released by the vendor. Until a patch is available, implement strict input validation and output encoding on the 'status' parameter at the web application or server level if possible. Deploy Web Application Firewalls (WAFs) configured to detect and block reflected XSS payloads targeting the plugin's parameters. Educate users and staff about the risks of clicking suspicious links and employ Content Security Policy (CSP) headers to restrict script execution origins. Regularly audit and monitor web server logs for unusual request patterns involving the 'status' parameter. Consider disabling or replacing the plugin with a more secure alternative if immediate patching is not feasible. Additionally, ensure that WordPress core and other plugins are kept up to date to reduce overall attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-10T22:24:38.227Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e3eb7ef31ef0b59b7ea

Added to database: 2/25/2026, 9:48:46 PM

Last enriched: 2/26/2026, 4:27:42 AM

Last updated: 2/26/2026, 6:25:23 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats