CVE-2024-12815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zipang Point Maker
CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability in the Point Maker WordPress plugin by zipang, affecting all versions up to 0. 1. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'point_maker' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute whenever any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with potential impacts on confidentiality and integrity but no direct availability impact. Exploitation does not require user interaction but does require authenticated access with contributor privileges. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent script injection and subsequent attacks such as session hijacking or privilege escalation.
AI Analysis
Technical Summary
CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Point Maker plugin for WordPress, developed by zipang. The flaw exists in all versions up to and including 0.1.6, due to insufficient sanitization and escaping of user-supplied input within the plugin's 'point_maker' shortcode. Specifically, authenticated users with contributor-level or higher permissions can inject arbitrary JavaScript code into pages generated by the plugin. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability affects all installations of the plugin up to version 0.1.6, which may be present in WordPress sites worldwide, especially those allowing contributor-level user roles. The exploitability is moderate due to the need for authenticated access, but the impact can be significant if exploited.
Potential Impact
The primary impact of CVE-2024-12815 is the compromise of confidentiality and integrity of affected WordPress sites using the Point Maker plugin. An attacker with contributor-level access can inject persistent malicious scripts that execute in the context of other users, including administrators, potentially leading to session hijacking, privilege escalation, defacement, or data theft. This can undermine trust in the affected websites and lead to reputational damage, data breaches, or further compromise of internal systems. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user access controls or where contributor accounts are easily obtained or compromised. The scope is significant because WordPress is widely used globally, and the plugin may be installed on numerous sites, including corporate, educational, and governmental portals. Although no availability impact is noted, the indirect consequences of exploitation can disrupt normal operations and require incident response efforts.
Mitigation Recommendations
To mitigate CVE-2024-12815, organizations should first verify if they use the Point Maker plugin and identify the version in use. Since no official patch is currently linked, immediate steps include restricting contributor-level access to trusted users only and auditing existing content for injected scripts. Administrators should implement strict input validation and output escaping at the application level if possible, or temporarily disable the plugin until a secure update is released. Employing Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the 'point_maker' shortcode can reduce risk. Monitoring logs for suspicious activity from contributor accounts is recommended. Additionally, educating users about the risks of elevated privileges and enforcing strong authentication mechanisms will limit exploitation opportunities. Once a patch is available, prompt application is critical. Regular security assessments and plugin updates should be part of ongoing maintenance.
Affected Countries
United States, Germany, United Kingdom, Japan, Australia, Canada, France, India, Brazil, Netherlands
CVE-2024-12815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zipang Point Maker
Description
CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability in the Point Maker WordPress plugin by zipang, affecting all versions up to 0. 1. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the 'point_maker' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute whenever any user views the compromised page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with potential impacts on confidentiality and integrity but no direct availability impact. Exploitation does not require user interaction but does require authenticated access with contributor privileges. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent script injection and subsequent attacks such as session hijacking or privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2024-12815 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Point Maker plugin for WordPress, developed by zipang. The flaw exists in all versions up to and including 0.1.6, due to insufficient sanitization and escaping of user-supplied input within the plugin's 'point_maker' shortcode. Specifically, authenticated users with contributor-level or higher permissions can inject arbitrary JavaScript code into pages generated by the plugin. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability affects all installations of the plugin up to version 0.1.6, which may be present in WordPress sites worldwide, especially those allowing contributor-level user roles. The exploitability is moderate due to the need for authenticated access, but the impact can be significant if exploited.
Potential Impact
The primary impact of CVE-2024-12815 is the compromise of confidentiality and integrity of affected WordPress sites using the Point Maker plugin. An attacker with contributor-level access can inject persistent malicious scripts that execute in the context of other users, including administrators, potentially leading to session hijacking, privilege escalation, defacement, or data theft. This can undermine trust in the affected websites and lead to reputational damage, data breaches, or further compromise of internal systems. Since the vulnerability requires authenticated access, the risk is higher in environments with weak user access controls or where contributor accounts are easily obtained or compromised. The scope is significant because WordPress is widely used globally, and the plugin may be installed on numerous sites, including corporate, educational, and governmental portals. Although no availability impact is noted, the indirect consequences of exploitation can disrupt normal operations and require incident response efforts.
Mitigation Recommendations
To mitigate CVE-2024-12815, organizations should first verify if they use the Point Maker plugin and identify the version in use. Since no official patch is currently linked, immediate steps include restricting contributor-level access to trusted users only and auditing existing content for injected scripts. Administrators should implement strict input validation and output escaping at the application level if possible, or temporarily disable the plugin until a secure update is released. Employing Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the 'point_maker' shortcode can reduce risk. Monitoring logs for suspicious activity from contributor accounts is recommended. Additionally, educating users about the risks of elevated privileges and enforcing strong authentication mechanisms will limit exploitation opportunities. Once a patch is available, prompt application is critical. Regular security assessments and plugin updates should be part of ongoing maintenance.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-19T20:09:40.738Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e48b7ef31ef0b59c4cd
Added to database: 2/25/2026, 9:48:56 PM
Last enriched: 2/26/2026, 2:58:29 AM
Last updated: 2/26/2026, 9:37:45 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.