CVE-2024-13455: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smtm igumbi Online Booking
CVE-2024-13455 is a stored Cross-Site Scripting (XSS) vulnerability in the igumbi Online Booking WordPress plugin up to version 1. 40. It arises from improper sanitization and escaping of user-supplied attributes in the 'igumbi_calendar' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the affected page. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its network exploitability and limited privileges required. While no known exploits are reported in the wild, the stored nature of the XSS can lead to persistent attacks affecting multiple users. Organizations using this plugin should prioritize patching or applying mitigations to prevent script injection and protect user confidentiality and integrity.
AI Analysis
Technical Summary
CVE-2024-13455 is a stored Cross-Site Scripting vulnerability identified in the igumbi Online Booking plugin for WordPress, affecting all versions up to and including 1.40. The root cause is insufficient input sanitization and output escaping of user-supplied attributes within the 'igumbi_calendar' shortcode. This flaw allows authenticated attackers with contributor-level permissions or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the context of the victim's browser session. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector over the network, low attack complexity, requiring privileges (contributor or above), no user interaction, and scope change due to the impact on other users. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to websites using this plugin, especially those allowing multiple contributors or editors. The CWE-79 classification confirms the issue as improper neutralization of input during web page generation, a common and impactful web security flaw.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality and integrity for users interacting with affected WordPress sites. An attacker can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. Since the vulnerability requires contributor-level access, attackers must first gain some level of authenticated access, which may be feasible on multi-user sites or those with weak account controls. The stored nature of the XSS means the malicious payload persists and affects all users viewing the infected page, increasing the attack surface. Although availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on igumbi Online Booking for customer-facing booking services risk exposing their users to phishing, account compromise, and data theft, which can lead to regulatory penalties and loss of customer trust.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates from the plugin vendor once available. In the absence of patches, administrators should restrict contributor-level access to trusted users only and audit existing user permissions to minimize risk. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the 'igumbi_calendar' shortcode parameters can provide temporary protection. Site owners should also enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly scanning the website for injected scripts and monitoring logs for suspicious activity is recommended. Developers maintaining the plugin should improve input validation by sanitizing and escaping all user-supplied attributes in shortcodes before rendering. Finally, educating users about the risks of XSS and enforcing strong authentication and session management practices will reduce exploitation likelihood.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13455: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smtm igumbi Online Booking
Description
CVE-2024-13455 is a stored Cross-Site Scripting (XSS) vulnerability in the igumbi Online Booking WordPress plugin up to version 1. 40. It arises from improper sanitization and escaping of user-supplied attributes in the 'igumbi_calendar' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the affected page. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its network exploitability and limited privileges required. While no known exploits are reported in the wild, the stored nature of the XSS can lead to persistent attacks affecting multiple users. Organizations using this plugin should prioritize patching or applying mitigations to prevent script injection and protect user confidentiality and integrity.
AI-Powered Analysis
Technical Analysis
CVE-2024-13455 is a stored Cross-Site Scripting vulnerability identified in the igumbi Online Booking plugin for WordPress, affecting all versions up to and including 1.40. The root cause is insufficient input sanitization and output escaping of user-supplied attributes within the 'igumbi_calendar' shortcode. This flaw allows authenticated attackers with contributor-level permissions or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the context of the victim's browser session. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector over the network, low attack complexity, requiring privileges (contributor or above), no user interaction, and scope change due to the impact on other users. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to websites using this plugin, especially those allowing multiple contributors or editors. The CWE-79 classification confirms the issue as improper neutralization of input during web page generation, a common and impactful web security flaw.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality and integrity for users interacting with affected WordPress sites. An attacker can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. Since the vulnerability requires contributor-level access, attackers must first gain some level of authenticated access, which may be feasible on multi-user sites or those with weak account controls. The stored nature of the XSS means the malicious payload persists and affects all users viewing the infected page, increasing the attack surface. Although availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on igumbi Online Booking for customer-facing booking services risk exposing their users to phishing, account compromise, and data theft, which can lead to regulatory penalties and loss of customer trust.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates from the plugin vendor once available. In the absence of patches, administrators should restrict contributor-level access to trusted users only and audit existing user permissions to minimize risk. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the 'igumbi_calendar' shortcode parameters can provide temporary protection. Site owners should also enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly scanning the website for injected scripts and monitoring logs for suspicious activity is recommended. Developers maintaining the plugin should improve input validation by sanitizing and escaping all user-supplied attributes in shortcodes before rendering. Finally, educating users about the risks of XSS and enforcing strong authentication and session management practices will reduce exploitation likelihood.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T14:52:56.740Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e59b7ef31ef0b59eaca
Added to database: 2/25/2026, 9:49:13 PM
Last enriched: 2/26/2026, 12:47:25 AM
Last updated: 2/26/2026, 9:11:47 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
UnknownCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
UnknownCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
UnknownCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
UnknownCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.