CVE-2024-12508: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glofoxwebdev Glofox Shortcodes
CVE-2024-12508 is a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes WordPress plugin, affecting all versions up to 2. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'glofox' and 'glofox_lead_capture' shortcodes. Authenticated users with contributor-level or higher privileges can inject malicious scripts that execute when any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. This flaw can lead to partial confidentiality and integrity loss but does not affect availability. Organizations using this plugin should apply strict input validation and output encoding, restrict contributor privileges, and monitor for suspicious activity. Countries with significant WordPress usage and Glofox plugin adoption, such as the United States, United Kingdom, Canada, Australia, and Germany, are most at risk.
AI Analysis
Technical Summary
CVE-2024-12508 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes plugin for WordPress, specifically in all versions up to and including 2.6. The vulnerability stems from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'glofox' and 'glofox_lead_capture' shortcodes. This improper neutralization of input (CWE-79) allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by these shortcodes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability does not require user interaction beyond viewing the affected page and does not require elevated privileges beyond contributor access. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, impacting confidentiality and integrity but not availability. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed in January 2025, with the Wordfence team as the assigner.
Potential Impact
This vulnerability can significantly impact organizations using the Glofox Shortcodes plugin by enabling attackers with contributor-level access to inject persistent malicious scripts. The injected scripts can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users, undermining confidentiality and integrity of data. While availability is not directly affected, the reputational damage and potential data breaches can lead to operational disruptions and loss of customer trust. Since WordPress powers a large portion of websites globally, and Glofox is a niche plugin used in fitness and gym management sectors, organizations in these industries are particularly vulnerable. Attackers exploiting this flaw could target administrative users or customers, potentially leading to broader compromise of the website or connected systems. The medium severity rating reflects the need for prompt remediation to prevent exploitation, especially in environments with multiple contributors or less stringent access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict contributor-level privileges to trusted users only, minimizing the risk of malicious shortcode attribute injection. Implement strict input validation and output encoding for all user-supplied data within the plugin's shortcode attributes, either by applying available patches once released or by manually sanitizing inputs in the plugin code. Monitor website logs and user activity for unusual behavior or unexpected script injections. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly update WordPress plugins and core to the latest versions and subscribe to vendor security advisories for timely patching. Consider temporarily disabling the affected shortcodes if feasible until a patch is available. Additionally, conduct security awareness training for contributors to recognize the risks of injecting untrusted content.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, Ireland, New Zealand, South Africa
CVE-2024-12508: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glofoxwebdev Glofox Shortcodes
Description
CVE-2024-12508 is a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes WordPress plugin, affecting all versions up to 2. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'glofox' and 'glofox_lead_capture' shortcodes. Authenticated users with contributor-level or higher privileges can inject malicious scripts that execute when any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. This flaw can lead to partial confidentiality and integrity loss but does not affect availability. Organizations using this plugin should apply strict input validation and output encoding, restrict contributor privileges, and monitor for suspicious activity. Countries with significant WordPress usage and Glofox plugin adoption, such as the United States, United Kingdom, Canada, Australia, and Germany, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12508 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes plugin for WordPress, specifically in all versions up to and including 2.6. The vulnerability stems from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'glofox' and 'glofox_lead_capture' shortcodes. This improper neutralization of input (CWE-79) allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by these shortcodes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability does not require user interaction beyond viewing the affected page and does not require elevated privileges beyond contributor access. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, impacting confidentiality and integrity but not availability. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed in January 2025, with the Wordfence team as the assigner.
Potential Impact
This vulnerability can significantly impact organizations using the Glofox Shortcodes plugin by enabling attackers with contributor-level access to inject persistent malicious scripts. The injected scripts can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users, undermining confidentiality and integrity of data. While availability is not directly affected, the reputational damage and potential data breaches can lead to operational disruptions and loss of customer trust. Since WordPress powers a large portion of websites globally, and Glofox is a niche plugin used in fitness and gym management sectors, organizations in these industries are particularly vulnerable. Attackers exploiting this flaw could target administrative users or customers, potentially leading to broader compromise of the website or connected systems. The medium severity rating reflects the need for prompt remediation to prevent exploitation, especially in environments with multiple contributors or less stringent access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict contributor-level privileges to trusted users only, minimizing the risk of malicious shortcode attribute injection. Implement strict input validation and output encoding for all user-supplied data within the plugin's shortcode attributes, either by applying available patches once released or by manually sanitizing inputs in the plugin code. Monitor website logs and user activity for unusual behavior or unexpected script injections. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly update WordPress plugins and core to the latest versions and subscribe to vendor security advisories for timely patching. Consider temporarily disabling the affected shortcodes if feasible until a patch is available. Additionally, conduct security awareness training for contributors to recognize the risks of injecting untrusted content.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-11T13:21:18.691Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e40b7ef31ef0b59baa0
Added to database: 2/25/2026, 9:48:48 PM
Last enriched: 2/26/2026, 4:12:40 AM
Last updated: 2/26/2026, 6:18:16 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.