CVE-2024-12813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pixelgrade Open Hours – Easy Opening Hours
CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin Open Hours – Easy Opening Hours, affecting all versions up to 1. 0. 9. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'open-hours-current-status' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. Organizations using this plugin should update or apply mitigations promptly to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability identified in the Open Hours – Easy Opening Hours WordPress plugin developed by pixelgrade. This vulnerability exists in all versions up to and including 1.0.9. The root cause is insufficient sanitization and escaping of user-supplied attributes passed through the 'open-hours-current-status' shortcode, which allows authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing actions on behalf of the victim. The vulnerability leverages CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires authentication but no additional user interaction, and the attack surface is scoped to WordPress sites using this plugin. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites that allow contributor-level users to add or edit content using the vulnerable shortcode.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks, which can lead to session hijacking, defacement, unauthorized actions performed in the context of the victim user, and possible data theft. Since the vulnerability requires contributor-level access, attackers who have compromised or obtained such credentials can leverage this flaw to escalate their impact beyond their privileges. This can undermine trust in affected websites, damage brand reputation, and lead to data breaches or further compromise of user accounts. For organizations running WordPress sites with this plugin, especially those with multiple content contributors, the risk includes unauthorized content manipulation and potential spread of malware or phishing via injected scripts. The vulnerability does not affect availability directly but compromises confidentiality and integrity of user sessions and data.
Mitigation Recommendations
Organizations should immediately update the Open Hours – Easy Opening Hours plugin to a version that patches this vulnerability once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the plugin or the vulnerable shortcode. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide interim protection. Additionally, site owners should audit existing content for injected scripts and remove any malicious payloads. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly reviewing user roles and permissions to minimize unnecessary contributor access reduces the attack surface. Monitoring logs for unusual activity related to shortcode usage can aid in early detection of exploitation attempts.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-12813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pixelgrade Open Hours – Easy Opening Hours
Description
CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin Open Hours – Easy Opening Hours, affecting all versions up to 1. 0. 9. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'open-hours-current-status' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. Organizations using this plugin should update or apply mitigations promptly to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability identified in the Open Hours – Easy Opening Hours WordPress plugin developed by pixelgrade. This vulnerability exists in all versions up to and including 1.0.9. The root cause is insufficient sanitization and escaping of user-supplied attributes passed through the 'open-hours-current-status' shortcode, which allows authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing actions on behalf of the victim. The vulnerability leverages CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires authentication but no additional user interaction, and the attack surface is scoped to WordPress sites using this plugin. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites that allow contributor-level users to add or edit content using the vulnerable shortcode.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks, which can lead to session hijacking, defacement, unauthorized actions performed in the context of the victim user, and possible data theft. Since the vulnerability requires contributor-level access, attackers who have compromised or obtained such credentials can leverage this flaw to escalate their impact beyond their privileges. This can undermine trust in affected websites, damage brand reputation, and lead to data breaches or further compromise of user accounts. For organizations running WordPress sites with this plugin, especially those with multiple content contributors, the risk includes unauthorized content manipulation and potential spread of malware or phishing via injected scripts. The vulnerability does not affect availability directly but compromises confidentiality and integrity of user sessions and data.
Mitigation Recommendations
Organizations should immediately update the Open Hours – Easy Opening Hours plugin to a version that patches this vulnerability once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the plugin or the vulnerable shortcode. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide interim protection. Additionally, site owners should audit existing content for injected scripts and remove any malicious payloads. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly reviewing user roles and permissions to minimize unnecessary contributor access reduces the attack surface. Monitoring logs for unusual activity related to shortcode usage can aid in early detection of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-19T20:05:32.701Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e48b7ef31ef0b59c47d
Added to database: 2/25/2026, 9:48:56 PM
Last enriched: 2/26/2026, 2:58:55 AM
Last updated: 2/26/2026, 6:17:51 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.