Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12809: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pickplugins Wishlist

0
Medium
VulnerabilityCVE-2024-12809cvecve-2024-12809cwe-79
Published: Fri Mar 07 2025 (03/07/2025, 06:40:03 UTC)
Source: CVE Database V5
Vendor/Project: pickplugins
Product: Wishlist

Description

CVE-2024-12809 is a stored Cross-Site Scripting (XSS) vulnerability in the pickplugins Wishlist WordPress plugin versions up to 1. 0. 43. It arises from improper input sanitization and output escaping in the 'wishlist_button' shortcode, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially compromising user data and session integrity. The vulnerability has a CVSS 3. 1 score of 6. 4, indicating medium severity, with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this plugin. Mitigation requires updating the plugin once a patch is released or applying manual input validation and output encoding.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:59:08 UTC

Technical Analysis

CVE-2024-12809 is a stored Cross-Site Scripting (XSS) vulnerability identified in the pickplugins Wishlist plugin for WordPress, affecting all versions up to and including 1.0.43. The vulnerability stems from insufficient sanitization and escaping of user-supplied attributes in the 'wishlist_button' shortcode, which is used to generate wishlist buttons on web pages. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via the shortcode parameters. Because the injected scripts are stored persistently, they execute in the context of any user who views the compromised page, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. The CVSS 3.1 vector indicates the attack can be launched remotely over the network with low complexity and without user interaction, but requires some level of authentication (contributor or above). The vulnerability affects the confidentiality and integrity of user data but does not impact availability. No public exploits have been reported yet, but the widespread use of WordPress and the plugin increases the risk of exploitation once a proof-of-concept becomes available. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

The primary impact of CVE-2024-12809 is the compromise of confidentiality and integrity of user data on affected WordPress sites using the pickplugins Wishlist plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the browsers of site visitors, which can lead to theft of session cookies, user credentials, or other sensitive information. This can facilitate account takeover, unauthorized actions, or further attacks such as phishing or malware distribution. Since the vulnerability requires contributor-level access, attackers must first gain some authenticated access, which may be feasible through social engineering or exploiting other vulnerabilities. The scope includes all users who visit pages containing the injected shortcode, potentially affecting a large number of site visitors. Although availability is not directly impacted, the reputational damage and loss of user trust can be significant. Organizations relying on this plugin for e-commerce or community engagement risk financial loss and regulatory consequences if user data is compromised. The medium CVSS score reflects the moderate ease of exploitation combined with significant potential damage to user trust and data security.

Mitigation Recommendations

To mitigate CVE-2024-12809, organizations should first check for and apply any official patches or updates released by pickplugins that address this vulnerability. If no patch is available, administrators should consider temporarily disabling the Wishlist plugin or removing the 'wishlist_button' shortcode from all pages to prevent exploitation. Implementing strict input validation and output encoding on all user-supplied shortcode attributes can reduce risk; this may require custom code or third-party security plugins that enforce sanitization. Restricting contributor-level access to trusted users only and auditing existing contributor accounts can limit the attack surface. Monitoring web server and application logs for unusual shortcode usage or script injection attempts is recommended. Employing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the plugin can provide additional protection. Educating site administrators and users about phishing and social engineering risks helps prevent initial unauthorized access. Finally, regular security assessments and vulnerability scans should be conducted to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T18:41:17.715Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c461

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:59:08 AM

Last updated: 2/26/2026, 6:35:24 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats