CVE-2024-12725: CWE-79 Cross-Site Scripting (XSS) in Unknown Clasify Classified Listing
The Clasify Classified Listing WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
AI Analysis
Technical Summary
CVE-2024-12725 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Clasify Classified Listing WordPress plugin, affecting versions through 1.0.7. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input parameters before reflecting them back in the webpage output. This lack of input validation allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser. Since the vulnerability is reflected, the malicious payload is delivered via a crafted URL or request that a victim must interact with, typically by clicking a link. The vulnerability is particularly concerning for high-privilege users such as administrators, as successful exploitation can lead to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The CVSS 3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction, and impacts confidentiality and integrity with a scope change. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-79, which is a common and well-understood category of web application security issues related to improper output encoding and input validation.
Potential Impact
For European organizations using the Clasify Classified Listing WordPress plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications and user data. If exploited, attackers could execute arbitrary scripts in the browsers of administrators or other privileged users, potentially leading to theft of authentication tokens, unauthorized administrative actions, or defacement of the website. This could result in data breaches, loss of user trust, and reputational damage. Given that WordPress is widely used across Europe for various business and community websites, organizations relying on this plugin for classified listings or similar functionalities may be targeted. The impact is heightened for organizations with sensitive or regulated data, such as those in finance, healthcare, or government sectors, where administrative account compromise could have cascading effects. However, the requirement for user interaction and the reflected nature of the XSS somewhat limit the attack's reach compared to stored XSS. Still, phishing or social engineering campaigns could be used to lure administrators into clicking malicious links, increasing risk.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Clasify Classified Listing plugin, specifically versions up to 1.0.7. Until an official patch is released, organizations should consider the following mitigations: 1) Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns targeting the vulnerable parameter to prevent malicious payload delivery. 2) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 3) Educate administrators and privileged users about the risk of clicking untrusted links, especially those that appear to come from internal sources. 4) Monitor web server logs for unusual query parameters or repeated attempts to exploit reflected XSS. 5) If feasible, disable or replace the vulnerable plugin with a more secure alternative until a patch is available. 6) Follow up with the plugin vendor or community for updates and apply patches promptly once released. These steps go beyond generic advice by focusing on immediate protective controls and user awareness tailored to this specific reflected XSS vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2024-12725: CWE-79 Cross-Site Scripting (XSS) in Unknown Clasify Classified Listing
Description
The Clasify Classified Listing WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
AI-Powered Analysis
Technical Analysis
CVE-2024-12725 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Clasify Classified Listing WordPress plugin, affecting versions through 1.0.7. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input parameters before reflecting them back in the webpage output. This lack of input validation allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser. Since the vulnerability is reflected, the malicious payload is delivered via a crafted URL or request that a victim must interact with, typically by clicking a link. The vulnerability is particularly concerning for high-privilege users such as administrators, as successful exploitation can lead to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The CVSS 3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction, and impacts confidentiality and integrity with a scope change. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-79, which is a common and well-understood category of web application security issues related to improper output encoding and input validation.
Potential Impact
For European organizations using the Clasify Classified Listing WordPress plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications and user data. If exploited, attackers could execute arbitrary scripts in the browsers of administrators or other privileged users, potentially leading to theft of authentication tokens, unauthorized administrative actions, or defacement of the website. This could result in data breaches, loss of user trust, and reputational damage. Given that WordPress is widely used across Europe for various business and community websites, organizations relying on this plugin for classified listings or similar functionalities may be targeted. The impact is heightened for organizations with sensitive or regulated data, such as those in finance, healthcare, or government sectors, where administrative account compromise could have cascading effects. However, the requirement for user interaction and the reflected nature of the XSS somewhat limit the attack's reach compared to stored XSS. Still, phishing or social engineering campaigns could be used to lure administrators into clicking malicious links, increasing risk.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Clasify Classified Listing plugin, specifically versions up to 1.0.7. Until an official patch is released, organizations should consider the following mitigations: 1) Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns targeting the vulnerable parameter to prevent malicious payload delivery. 2) Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 3) Educate administrators and privileged users about the risk of clicking untrusted links, especially those that appear to come from internal sources. 4) Monitor web server logs for unusual query parameters or repeated attempts to exploit reflected XSS. 5) If feasible, disable or replace the vulnerable plugin with a more secure alternative until a patch is available. 6) Follow up with the plugin vendor or community for updates and apply patches promptly once released. These steps go beyond generic advice by focusing on immediate protective controls and user awareness tailored to this specific reflected XSS vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-12-17T18:10:41.765Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec1df
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:12:05 AM
Last updated: 8/8/2025, 11:03:54 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.