Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12633: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in beardev JoomSport – for Sports: Team & League, Football, Hockey & more

0
High
VulnerabilityCVE-2024-12633cvecve-2024-12633cwe-79
Published: Tue Jan 07 2025 (01/07/2025, 05:23:57 UTC)
Source: CVE Database V5
Vendor/Project: beardev
Product: JoomSport – for Sports: Team & League, Football, Hockey & more

Description

CVE-2024-12633 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability in the JoomSport WordPress plugin, affecting all versions up to 5. 6. 17. It arises from improper input sanitization and output escaping of the 'page' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. This can result in theft of sensitive information, session hijacking, or unauthorized actions performed on behalf of the user. The vulnerability has a CVSS score of 7. 1, indicating significant risk. No known exploits are currently in the wild, but the widespread use of WordPress and this plugin increases potential exposure. Organizations using JoomSport should prioritize patching or applying mitigations promptly to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:10:48 UTC

Technical Analysis

CVE-2024-12633 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress developed by beardev. The flaw exists in all versions up to and including 5.6.17, where the plugin fails to properly sanitize and escape user-supplied input in the 'page' parameter during web page generation. This improper neutralization allows an attacker to craft malicious URLs containing JavaScript code that, when clicked by an unsuspecting user, executes within the context of the victim’s browser session. Since the vulnerability is reflected, the malicious script is not stored but immediately reflected back in the HTTP response. The attack vector is remote and requires no authentication, but user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality, integrity, and availability by enabling session hijacking, theft of cookies or credentials, and potentially unauthorized actions on the affected WordPress site. The CVSS 3.1 base score is 7.1, reflecting a high severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in a scope change. No patches or exploit code are currently publicly available, but the risk remains significant given the plugin’s usage in sports-related WordPress sites worldwide.

Potential Impact

The vulnerability poses a significant risk to organizations running WordPress sites with the JoomSport plugin, especially those managing sports teams, leagues, or fan engagement platforms. Successful exploitation can lead to session hijacking, credential theft, defacement, or unauthorized actions performed under the victim’s identity, potentially damaging reputation and user trust. Attackers could leverage this to spread malware, conduct phishing campaigns, or pivot to further attacks within the organization’s network. The reflected nature means attacks require social engineering to lure users into clicking malicious links, which can be distributed via email, social media, or forums. Given WordPress’s extensive global adoption and the popularity of sports-related content, a large number of websites and their users are at risk. The vulnerability could also affect site availability if exploited to inject disruptive scripts. Organizations with high traffic sports websites or those handling sensitive user data are particularly vulnerable to reputational and operational impacts.

Mitigation Recommendations

Organizations should immediately update the JoomSport plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators can implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'page' parameter. Input validation and output encoding should be enforced at the application level to neutralize script injection attempts. Site owners should educate users about the risks of clicking suspicious links and implement Content Security Policy (CSP) headers to restrict script execution sources. Regular security audits and monitoring for unusual activity related to the plugin are recommended. Additionally, disabling or removing the plugin temporarily can mitigate risk if patching is delayed. Logging and alerting on anomalous HTTP requests containing suspicious script patterns in query parameters can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-13T21:06:45.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e46b7ef31ef0b59c26d

Added to database: 2/25/2026, 9:48:54 PM

Last enriched: 2/26/2026, 3:10:48 AM

Last updated: 2/26/2026, 6:54:56 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats