Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pixelgrade Open Hours – Easy Opening Hours

0
Medium
VulnerabilityCVE-2024-12813cvecve-2024-12813cwe-79
Published: Tue Feb 18 2025 (02/18/2025, 04:21:14 UTC)
Source: CVE Database V5
Vendor/Project: pixelgrade
Product: Open Hours – Easy Opening Hours

Description

CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin Open Hours – Easy Opening Hours, affecting all versions up to 1. 0. 9. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'open-hours-current-status' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. Organizations using this plugin should update or apply mitigations promptly to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:58:55 UTC

Technical Analysis

CVE-2024-12813 is a stored cross-site scripting (XSS) vulnerability identified in the Open Hours – Easy Opening Hours WordPress plugin developed by pixelgrade. This vulnerability exists in all versions up to and including 1.0.9. The root cause is insufficient sanitization and escaping of user-supplied attributes passed through the 'open-hours-current-status' shortcode, which allows authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing actions on behalf of the victim. The vulnerability leverages CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires authentication but no additional user interaction, and the attack surface is scoped to WordPress sites using this plugin. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites that allow contributor-level users to add or edit content using the vulnerable shortcode.

Potential Impact

The primary impact of this vulnerability is the potential for stored XSS attacks, which can lead to session hijacking, defacement, unauthorized actions performed in the context of the victim user, and possible data theft. Since the vulnerability requires contributor-level access, attackers who have compromised or obtained such credentials can leverage this flaw to escalate their impact beyond their privileges. This can undermine trust in affected websites, damage brand reputation, and lead to data breaches or further compromise of user accounts. For organizations running WordPress sites with this plugin, especially those with multiple content contributors, the risk includes unauthorized content manipulation and potential spread of malware or phishing via injected scripts. The vulnerability does not affect availability directly but compromises confidentiality and integrity of user sessions and data.

Mitigation Recommendations

Organizations should immediately update the Open Hours – Easy Opening Hours plugin to a version that patches this vulnerability once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the plugin or the vulnerable shortcode. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide interim protection. Additionally, site owners should audit existing content for injected scripts and remove any malicious payloads. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly reviewing user roles and permissions to minimize unnecessary contributor access reduces the attack surface. Monitoring logs for unusual activity related to shortcode usage can aid in early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T20:05:32.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c47d

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:58:55 AM

Last updated: 2/26/2026, 6:17:51 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats