Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zipang Point Maker

0
Medium
VulnerabilityCVE-2024-12815cvecve-2024-12815cwe-79
Published: Wed Mar 05 2025 (03/05/2025, 09:21:48 UTC)
Source: CVE Database V5
Vendor/Project: zipang
Product: Point Maker

Description

CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability in the Point Maker WordPress plugin by zipang, affecting all versions up to 0. 1. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'point_maker' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute whenever any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with potential impacts on confidentiality and integrity but no direct availability impact. Exploitation does not require user interaction but does require authenticated access with contributor privileges. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent script injection and subsequent attacks such as session hijacking or privilege escalation.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:58:29 UTC

Technical Analysis

CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Point Maker plugin for WordPress, developed by zipang. The flaw exists in all versions up to and including 0.1.6, due to insufficient sanitization and escaping of user-supplied input within the plugin's 'point_maker' shortcode. Specifically, authenticated users with contributor-level or higher permissions can inject arbitrary JavaScript code into pages generated by the plugin. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability affects all installations of the plugin up to version 0.1.6, which may be present in WordPress sites worldwide, especially those allowing contributor-level user roles. The exploitability is moderate due to the need for authenticated access, but the impact can be significant if exploited.

Potential Impact

The primary impact of CVE-2024-12815 is the compromise of confidentiality and integrity of affected WordPress sites using the Point Maker plugin. An attacker with contributor-level access can inject persistent malicious scripts that execute in the context of other users, including administrators, potentially leading to session hijacking, privilege escalation, defacement, or data theft. This can undermine trust in the affected websites and lead to reputational damage, data breaches, or further compromise of internal systems. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user access controls or where contributor accounts are easily obtained or compromised. The scope is significant because WordPress is widely used globally, and the plugin may be installed on numerous sites, including corporate, educational, and governmental portals. Although no availability impact is noted, the indirect consequences of exploitation can disrupt normal operations and require incident response efforts.

Mitigation Recommendations

To mitigate CVE-2024-12815, organizations should first verify if they use the Point Maker plugin and identify the version in use. Since no official patch is currently linked, immediate steps include restricting contributor-level access to trusted users only and auditing existing content for injected scripts. Administrators should implement strict input validation and output escaping at the application level if possible, or temporarily disable the plugin until a secure update is released. Employing Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the 'point_maker' shortcode can reduce risk. Monitoring logs for suspicious activity from contributor accounts is recommended. Additionally, educating users about the risks of elevated privileges and enforcing strong authentication mechanisms will limit exploitation opportunities. Once a patch is available, prompt application is critical. Regular security assessments and plugin updates should be part of ongoing maintenance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-19T20:09:40.738Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e48b7ef31ef0b59c4cd

Added to database: 2/25/2026, 9:48:56 PM

Last enriched: 2/26/2026, 2:58:29 AM

Last updated: 2/26/2026, 9:37:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats