CVE-2024-12528: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pantherius WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress
CVE-2024-12528 is a stored cross-site scripting (XSS) vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin by pantherius, affecting all versions up to 1. 7. 5. The flaw arises from insufficient input sanitization and output escaping in the 'wpsurveypoll_results' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires patching the plugin once updates are available or applying strict input validation and output encoding. Organizations using this plugin should review user privileges and monitor for suspicious activity. Countries with significant WordPress usage and active contributor communities are most at risk.
AI Analysis
Technical Summary
CVE-2024-12528 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 that affects the WordPress Survey & Poll – Quiz, Survey and Poll Plugin developed by pantherius. This vulnerability exists in all versions up to and including 1.7.5 due to improper neutralization of user-supplied input in the 'wpsurveypoll_results' shortcode. Specifically, the plugin fails to adequately sanitize and escape input attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability requires no user interaction beyond viewing the affected page but does require the attacker to have contributor or higher privileges, which limits exploitation to insiders or compromised accounts. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, privileges required, no user interaction, scope change, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of WordPress and this plugin. The lack of a patch at the time of reporting necessitates interim mitigations such as restricting contributor access and monitoring for suspicious shortcode usage.
Potential Impact
The primary impact of CVE-2024-12528 is the compromise of confidentiality and integrity within affected WordPress sites. Attackers with contributor-level access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, theft of sensitive information, unauthorized actions, or site defacement. This can erode user trust, damage brand reputation, and expose organizations to further attacks such as privilege escalation or data exfiltration. Because the vulnerability requires authenticated access, the risk is higher in environments with many contributors or weak account controls. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially compromised component, potentially impacting the entire site. Although availability is not directly affected, the indirect consequences of exploitation, such as administrative lockout or cleanup efforts, can disrupt operations. Organizations relying on this plugin for surveys and polls may face data integrity issues and user privacy violations if exploited.
Mitigation Recommendations
1. Immediately restrict contributor-level and higher user permissions to trusted personnel only, minimizing the risk of malicious script injection. 2. Monitor and audit all uses of the 'wpsurveypoll_results' shortcode for suspicious or unexpected content. 3. Apply strict input validation and output encoding on all user-supplied data related to the plugin, either via custom code or security plugins that enforce sanitization. 4. Disable or remove the vulnerable plugin if it is not essential to reduce the attack surface. 5. Stay alert for official patches or updates from pantherius and apply them promptly once released. 6. Implement a Web Application Firewall (WAF) with rules to detect and block common XSS payloads targeting this plugin. 7. Educate site administrators and contributors about the risks of XSS and safe content management practices. 8. Regularly back up site data to enable recovery in case of compromise. 9. Use security plugins that can detect and alert on unauthorized script injections or changes in shortcode content. 10. Consider deploying Content Security Policy (CSP) headers to limit the impact of injected scripts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan, Italy
CVE-2024-12528: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pantherius WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress
Description
CVE-2024-12528 is a stored cross-site scripting (XSS) vulnerability in the WordPress Survey & Poll – Quiz, Survey and Poll Plugin by pantherius, affecting all versions up to 1. 7. 5. The flaw arises from insufficient input sanitization and output escaping in the 'wpsurveypoll_results' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires patching the plugin once updates are available or applying strict input validation and output encoding. Organizations using this plugin should review user privileges and monitor for suspicious activity. Countries with significant WordPress usage and active contributor communities are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12528 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 that affects the WordPress Survey & Poll – Quiz, Survey and Poll Plugin developed by pantherius. This vulnerability exists in all versions up to and including 1.7.5 due to improper neutralization of user-supplied input in the 'wpsurveypoll_results' shortcode. Specifically, the plugin fails to adequately sanitize and escape input attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability requires no user interaction beyond viewing the affected page but does require the attacker to have contributor or higher privileges, which limits exploitation to insiders or compromised accounts. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, privileges required, no user interaction, scope change, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of WordPress and this plugin. The lack of a patch at the time of reporting necessitates interim mitigations such as restricting contributor access and monitoring for suspicious shortcode usage.
Potential Impact
The primary impact of CVE-2024-12528 is the compromise of confidentiality and integrity within affected WordPress sites. Attackers with contributor-level access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, theft of sensitive information, unauthorized actions, or site defacement. This can erode user trust, damage brand reputation, and expose organizations to further attacks such as privilege escalation or data exfiltration. Because the vulnerability requires authenticated access, the risk is higher in environments with many contributors or weak account controls. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially compromised component, potentially impacting the entire site. Although availability is not directly affected, the indirect consequences of exploitation, such as administrative lockout or cleanup efforts, can disrupt operations. Organizations relying on this plugin for surveys and polls may face data integrity issues and user privacy violations if exploited.
Mitigation Recommendations
1. Immediately restrict contributor-level and higher user permissions to trusted personnel only, minimizing the risk of malicious script injection. 2. Monitor and audit all uses of the 'wpsurveypoll_results' shortcode for suspicious or unexpected content. 3. Apply strict input validation and output encoding on all user-supplied data related to the plugin, either via custom code or security plugins that enforce sanitization. 4. Disable or remove the vulnerable plugin if it is not essential to reduce the attack surface. 5. Stay alert for official patches or updates from pantherius and apply them promptly once released. 6. Implement a Web Application Firewall (WAF) with rules to detect and block common XSS payloads targeting this plugin. 7. Educate site administrators and contributors about the risks of XSS and safe content management practices. 8. Regularly back up site data to enable recovery in case of compromise. 9. Use security plugins that can detect and alert on unauthorized script injections or changes in shortcode content. 10. Consider deploying Content Security Policy (CSP) headers to limit the impact of injected scripts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-11T14:04:52.008Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e40b7ef31ef0b59bbca
Added to database: 2/25/2026, 9:48:48 PM
Last enriched: 2/26/2026, 3:57:43 AM
Last updated: 2/26/2026, 7:56:51 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.