Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12598: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zookatron MyBookProgress by Stormhill Media

0
Medium
VulnerabilityCVE-2024-12598cvecve-2024-12598cwe-79
Published: Fri Jan 17 2025 (01/17/2025, 07:01:28 UTC)
Source: CVE Database V5
Vendor/Project: zookatron
Product: MyBookProgress by Stormhill Media

Description

CVE-2024-12598 is a stored cross-site scripting (XSS) vulnerability in the MyBookProgress WordPress plugin by Stormhill Media, affecting all versions up to 1. 0. 8. Authenticated users with Contributor-level access or higher can exploit this flaw by injecting malicious scripts via the 'book' parameter. These scripts execute whenever other users view the compromised pages, potentially leading to session hijacking or unauthorized actions. The vulnerability arises from insufficient input sanitization and output escaping. It has a CVSS 3. 1 score of 6. 4, indicating a medium severity level. No known public exploits currently exist.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:29:51 UTC

Technical Analysis

CVE-2024-12598 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the MyBookProgress plugin for WordPress developed by Stormhill Media. This vulnerability affects all versions up to and including 1.0.8. The root cause is the plugin's failure to properly sanitize and escape user input submitted via the 'book' parameter. Authenticated users with Contributor-level permissions or higher can inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes in the browsers of any users who view the infected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The vulnerability does not require user interaction beyond viewing the page, and no authentication bypass is involved since the attacker must have at least Contributor access. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed because the vulnerability affects multiple users who access the injected content. No official patches are currently listed, and no known exploits have been observed in the wild. The vulnerability highlights the importance of rigorous input validation and output encoding in WordPress plugin development to prevent XSS attacks.

Potential Impact

The impact of CVE-2024-12598 on organizations worldwide can be significant, especially for those relying on the MyBookProgress plugin to manage book progress tracking on WordPress sites. Exploitation allows attackers with Contributor-level access to inject persistent malicious scripts, which execute in the context of other users' browsers. This can lead to theft of authentication cookies, enabling session hijacking and unauthorized access to user accounts, including potentially higher-privileged roles. Attackers might also perform actions on behalf of victims, such as changing content or settings, leading to integrity loss. Although the vulnerability does not directly affect availability, the compromise of user accounts and site integrity can result in reputational damage, loss of user trust, and potential data breaches. Since Contributor-level access is required, the threat is somewhat limited to environments where such user roles are assigned to untrusted or semi-trusted users. However, many WordPress sites allow multiple contributors, increasing the attack surface. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as the vulnerability is publicly disclosed and could be weaponized. Organizations with high-value WordPress sites or sensitive user data should consider this vulnerability a moderate risk requiring timely remediation.

Mitigation Recommendations

To mitigate CVE-2024-12598, organizations should first check for updates or patches from Stormhill Media or the plugin maintainers and apply them promptly once available. In the absence of official patches, administrators can implement the following measures: 1) Restrict Contributor-level permissions to trusted users only, minimizing the risk of malicious script injection. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the 'book' parameter. 3) Use security plugins that provide XSS protection and content sanitization layers for WordPress. 4) Conduct regular security audits and code reviews of installed plugins to identify and remediate insecure input handling. 5) Educate site administrators and contributors about the risks of XSS and safe content submission practices. 6) Consider disabling or replacing the MyBookProgress plugin with alternatives that follow secure coding practices if immediate patching is not feasible. 7) Monitor site logs and user activity for signs of exploitation or unusual behavior. These steps, combined with timely patching, will reduce the likelihood and impact of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-12T22:27:57.241Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e44b7ef31ef0b59c019

Added to database: 2/25/2026, 9:48:52 PM

Last enriched: 2/26/2026, 3:29:51 AM

Last updated: 2/26/2026, 8:36:14 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats