Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13612: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wordplus Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss

0
Medium
VulnerabilityCVE-2024-13612cvecve-2024-13612cwe-79
Published: Sat Feb 01 2025 (02/01/2025, 12:21:30 UTC)
Source: CVE Database V5
Vendor/Project: wordplus
Product: Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss

Description

CVE-2024-13612 is a stored cross-site scripting (XSS) vulnerability in the Better Messages – Live Chat plugin for WordPress and related platforms. It affects all versions up to 2. 6. 9 and allows authenticated users with contributor-level access or higher to inject malicious scripts via the 'better_messages_live_chat_button' shortcode. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or data theft. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction beyond visiting the injected page, and no higher privileges than contributor are needed. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact. No known exploits in the wild have been reported yet.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:27:48 UTC

Technical Analysis

CVE-2024-13612 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the Better Messages – Live Chat plugin for WordPress and its integrations with BuddyPress, PeepSo, Ultimate Member, and BuddyBoss. The vulnerability exists in all versions up to and including 2.6.9 due to improper neutralization of input during web page generation. Specifically, the plugin's 'better_messages_live_chat_button' shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code. This malicious code is stored persistently and executed in the context of any user who accesses the affected page, enabling attacks such as session hijacking, defacement, or unauthorized actions performed under the victim's credentials. The attack vector is remote over the network, with low complexity, requiring only contributor-level privileges and no user interaction for the payload to execute. The vulnerability impacts confidentiality and integrity but does not affect availability. Although no public exploits have been reported, the widespread use of WordPress and these popular plugins increases the risk of exploitation. The vulnerability was published on February 1, 2025, with a CVSS 3.1 base score of 6.4, indicating a medium severity level. The issue underscores the importance of proper input validation and output encoding in web applications, especially for plugins that handle user-generated content and dynamic page elements.

Potential Impact

The impact of CVE-2024-13612 is significant for organizations using the Better Messages – Live Chat plugin and its integrations on WordPress sites. Successful exploitation allows an authenticated contributor or higher to inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to theft of session cookies, enabling attackers to impersonate users with elevated privileges, potentially leading to full site compromise. Attackers could also manipulate page content, redirect users to malicious sites, or perform unauthorized actions on behalf of victims. The confidentiality and integrity of user data and site content are at risk, while availability is not directly impacted. Given the plugin's integration with popular community and membership platforms (BuddyPress, PeepSo, Ultimate Member, BuddyBoss), the vulnerability could affect social networks, membership sites, and community forums, amplifying the potential damage. Organizations with contributor-level users who are not fully trusted face increased risk. The vulnerability's medium severity score reflects these risks but also the requirement for some level of authenticated access, which somewhat limits the attack surface compared to unauthenticated XSS.

Mitigation Recommendations

To mitigate CVE-2024-13612, organizations should immediately update the Better Messages – Live Chat plugin to a patched version once available. Until a patch is released, administrators should restrict contributor-level permissions to trusted users only and audit existing contributors for suspicious activity. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injections targeting the 'better_messages_live_chat_button' shortcode parameters can provide temporary protection. Site owners should also enable Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. Regularly scanning the site for injected scripts or anomalous shortcode usage can help detect exploitation attempts early. Additionally, reviewing and hardening user input validation and output encoding in custom plugin code or extensions is recommended. Monitoring logs for unusual contributor activity and educating users about the risks of XSS can further reduce exposure. Finally, consider disabling or limiting the use of the vulnerable shortcode if it is not essential to site functionality.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-22T00:01:39.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e64b7ef31ef0b59fcca

Added to database: 2/25/2026, 9:49:24 PM

Last enriched: 2/25/2026, 11:27:48 PM

Last updated: 2/26/2026, 6:17:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats