CVE-2024-12504: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP
CVE-2024-12504 is a stored cross-site scripting (XSS) vulnerability in the Broadcast Live Video – Live Streaming WordPress plugin (versions up to 6. 1. 9). It arises from improper input sanitization and output escaping in the 'videowhisper_hls' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-12504 is a stored cross-site scripting (XSS) vulnerability identified in the Broadcast Live Video – Live Streaming plugin for WordPress, which supports HTML5, WebRTC, HLS, RTSP, and RTMP streaming protocols. The flaw exists in all versions up to and including 6.1.9, specifically within the 'videowhisper_hls' shortcode implementation. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. Because the malicious script is stored, it executes every time a user accesses the compromised page, potentially affecting all visitors. The vulnerability leverages CWE-79 (Improper Neutralization of Input During Web Page Generation) and can lead to session hijacking, unauthorized actions on behalf of users, or redirection to malicious sites. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required (low), no user interaction needed, and partial impact on confidentiality and integrity. No public exploit code or widespread exploitation has been reported yet. The vulnerability is critical for websites relying on this plugin for live video streaming, especially those with multiple contributors or user-generated content. Mitigation requires patching the plugin once an update is available or applying strict input validation and output encoding as a temporary measure.
Potential Impact
The vulnerability enables authenticated attackers with contributor-level access to inject persistent malicious scripts into web pages, which execute in the context of any user viewing those pages. This can lead to theft of session cookies, user impersonation, unauthorized actions, defacement, or distribution of malware. For organizations, this compromises the confidentiality and integrity of user data and can damage reputation. Since the plugin is used for live video streaming, attackers could also disrupt service trust or manipulate streaming content. The attack does not impact availability directly but can lead to broader security incidents. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with multiple contributors or less stringent access controls. The vulnerability affects all versions up to 6.1.9, so any unpatched installations remain at risk.
Mitigation Recommendations
1. Immediately update the Broadcast Live Video – Live Streaming plugin to a patched version once released by the vendor. 2. Until a patch is available, restrict contributor and higher roles from using the 'videowhisper_hls' shortcode or disable the plugin if feasible. 3. Implement strict input validation and output encoding on all user-supplied attributes related to the shortcode to prevent script injection. 4. Review and tighten user role permissions to minimize the number of users with contributor-level or higher access. 5. Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads to detect and block exploit attempts. 6. Monitor logs for unusual activity or injection attempts related to the shortcode. 7. Educate content contributors about safe content practices and the risks of injecting untrusted code. 8. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and user-generated content.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-12504: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP
Description
CVE-2024-12504 is a stored cross-site scripting (XSS) vulnerability in the Broadcast Live Video – Live Streaming WordPress plugin (versions up to 6. 1. 9). It arises from improper input sanitization and output escaping in the 'videowhisper_hls' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-12504 is a stored cross-site scripting (XSS) vulnerability identified in the Broadcast Live Video – Live Streaming plugin for WordPress, which supports HTML5, WebRTC, HLS, RTSP, and RTMP streaming protocols. The flaw exists in all versions up to and including 6.1.9, specifically within the 'videowhisper_hls' shortcode implementation. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. Because the malicious script is stored, it executes every time a user accesses the compromised page, potentially affecting all visitors. The vulnerability leverages CWE-79 (Improper Neutralization of Input During Web Page Generation) and can lead to session hijacking, unauthorized actions on behalf of users, or redirection to malicious sites. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required (low), no user interaction needed, and partial impact on confidentiality and integrity. No public exploit code or widespread exploitation has been reported yet. The vulnerability is critical for websites relying on this plugin for live video streaming, especially those with multiple contributors or user-generated content. Mitigation requires patching the plugin once an update is available or applying strict input validation and output encoding as a temporary measure.
Potential Impact
The vulnerability enables authenticated attackers with contributor-level access to inject persistent malicious scripts into web pages, which execute in the context of any user viewing those pages. This can lead to theft of session cookies, user impersonation, unauthorized actions, defacement, or distribution of malware. For organizations, this compromises the confidentiality and integrity of user data and can damage reputation. Since the plugin is used for live video streaming, attackers could also disrupt service trust or manipulate streaming content. The attack does not impact availability directly but can lead to broader security incidents. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with multiple contributors or less stringent access controls. The vulnerability affects all versions up to 6.1.9, so any unpatched installations remain at risk.
Mitigation Recommendations
1. Immediately update the Broadcast Live Video – Live Streaming plugin to a patched version once released by the vendor. 2. Until a patch is available, restrict contributor and higher roles from using the 'videowhisper_hls' shortcode or disable the plugin if feasible. 3. Implement strict input validation and output encoding on all user-supplied attributes related to the shortcode to prevent script injection. 4. Review and tighten user role permissions to minimize the number of users with contributor-level or higher access. 5. Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads to detect and block exploit attempts. 6. Monitor logs for unusual activity or injection attempts related to the shortcode. 7. Educate content contributors about safe content practices and the risks of injecting untrusted code. 8. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and user-generated content.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-11T13:09:37.334Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e3fb7ef31ef0b59b9c3
Added to database: 2/25/2026, 9:48:47 PM
Last enriched: 2/26/2026, 4:13:33 AM
Last updated: 2/26/2026, 8:28:10 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.