Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12508: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glofoxwebdev Glofox Shortcodes

0
Medium
VulnerabilityCVE-2024-12508cvecve-2024-12508cwe-79
Published: Fri Jan 17 2025 (01/17/2025, 07:01:26 UTC)
Source: CVE Database V5
Vendor/Project: glofoxwebdev
Product: Glofox Shortcodes

Description

CVE-2024-12508 is a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes WordPress plugin, affecting all versions up to 2. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'glofox' and 'glofox_lead_capture' shortcodes. Authenticated users with contributor-level or higher privileges can inject malicious scripts that execute when any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. This flaw can lead to partial confidentiality and integrity loss but does not affect availability. Organizations using this plugin should apply strict input validation and output encoding, restrict contributor privileges, and monitor for suspicious activity. Countries with significant WordPress usage and Glofox plugin adoption, such as the United States, United Kingdom, Canada, Australia, and Germany, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:12:40 UTC

Technical Analysis

CVE-2024-12508 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Glofox Shortcodes plugin for WordPress, specifically in all versions up to and including 2.6. The vulnerability stems from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'glofox' and 'glofox_lead_capture' shortcodes. This improper neutralization of input (CWE-79) allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by these shortcodes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability does not require user interaction beyond viewing the affected page and does not require elevated privileges beyond contributor access. The CVSS 3.1 score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, impacting confidentiality and integrity but not availability. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed in January 2025, with the Wordfence team as the assigner.

Potential Impact

This vulnerability can significantly impact organizations using the Glofox Shortcodes plugin by enabling attackers with contributor-level access to inject persistent malicious scripts. The injected scripts can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users, undermining confidentiality and integrity of data. While availability is not directly affected, the reputational damage and potential data breaches can lead to operational disruptions and loss of customer trust. Since WordPress powers a large portion of websites globally, and Glofox is a niche plugin used in fitness and gym management sectors, organizations in these industries are particularly vulnerable. Attackers exploiting this flaw could target administrative users or customers, potentially leading to broader compromise of the website or connected systems. The medium severity rating reflects the need for prompt remediation to prevent exploitation, especially in environments with multiple contributors or less stringent access controls.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict contributor-level privileges to trusted users only, minimizing the risk of malicious shortcode attribute injection. Implement strict input validation and output encoding for all user-supplied data within the plugin's shortcode attributes, either by applying available patches once released or by manually sanitizing inputs in the plugin code. Monitor website logs and user activity for unusual behavior or unexpected script injections. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly update WordPress plugins and core to the latest versions and subscribe to vendor security advisories for timely patching. Consider temporarily disabling the affected shortcodes if feasible until a patch is available. Additionally, conduct security awareness training for contributors to recognize the risks of injecting untrusted content.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-11T13:21:18.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e40b7ef31ef0b59baa0

Added to database: 2/25/2026, 9:48:48 PM

Last enriched: 2/26/2026, 4:12:40 AM

Last updated: 2/26/2026, 6:18:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats