Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12921: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ethereumicoio EthereumICO

0
Medium
VulnerabilityCVE-2024-12921cvecve-2024-12921cwe-79
Published: Thu Jan 30 2025 (01/30/2025, 05:23:00 UTC)
Source: CVE Database V5
Vendor/Project: ethereumicoio
Product: EthereumICO

Description

CVE-2024-12921 is a stored cross-site scripting (XSS) vulnerability in the EthereumICO WordPress plugin affecting all versions up to 2. 4. 6. It arises from improper input sanitization and output escaping of user-supplied attributes in the ethereum-ico shortcode. Authenticated users with contributor-level or higher privileges can inject malicious scripts that execute when other users view the affected pages. The vulnerability does not require user interaction but does require authenticated access, making exploitation moderately difficult. The CVSS score is 6. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent potential script injection attacks that could lead to session hijacking or privilege escalation.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:29:54 UTC

Technical Analysis

CVE-2024-12921 is a stored cross-site scripting vulnerability identified in the EthereumICO plugin for WordPress, which is widely used to integrate Ethereum ICO functionalities into WordPress sites. The vulnerability exists due to insufficient sanitization and escaping of user-supplied input in the ethereum-ico shortcode attributes. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the injected scripts execute in their browsers, potentially enabling session hijacking, unauthorized actions, or redirection to malicious sites. The vulnerability affects all versions up to and including 2.4.6. Exploitation does not require user interaction but does require authenticated access, limiting the attack surface to users with some level of privilege on the WordPress site. The CVSS 3.1 score is 6.4, indicating a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed due to the potential impact on other users viewing the injected content. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites using this plugin, especially those with multiple contributors or editors. The lack of a patch at the time of reporting necessitates immediate mitigation efforts by administrators.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality and integrity for users interacting with affected WordPress sites. Attackers can execute arbitrary scripts in the context of the victim’s browser, potentially stealing session cookies, credentials, or performing actions on behalf of the victim. This can lead to account takeover, unauthorized content modification, or phishing attacks. Since the vulnerability requires authenticated access, the risk is higher in environments with multiple contributors or editors. The availability of the site is not directly impacted. Organizations relying on the EthereumICO plugin for managing ICO-related content or Ethereum transactions risk reputational damage and user trust loss if exploited. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the network or to spread malware. The medium severity rating reflects the moderate ease of exploitation combined with the significant impact on user data and site integrity.

Mitigation Recommendations

Administrators should immediately restrict contributor-level and higher user privileges to trusted individuals only, minimizing the risk of malicious script injection. Until an official patch is released, consider disabling the EthereumICO plugin or removing the ethereum-ico shortcode usage from all pages. Implement a Web Application Firewall (WAF) with rules to detect and block suspicious script injections targeting shortcode attributes. Conduct thorough input validation and output encoding on all user-supplied data within the plugin if custom modifications are possible. Monitor logs for unusual activity from contributors or editors. Educate users about the risks of XSS and encourage strong authentication practices, including multi-factor authentication, to reduce the risk of compromised accounts. Once a patch is available, apply it promptly and verify that the vulnerability is remediated. Regularly update WordPress and all plugins to their latest versions to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-24T23:49:42.044Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c722

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:29:54 AM

Last updated: 2/26/2026, 7:52:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats