Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53745: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 코스모스팜 – Cosmosfarm 소셜 공유 버튼 By 코스모스팜

0
Unknown
VulnerabilityCVE-2024-53745cvecve-2024-53745
Published: Sun Dec 01 2024 (12/01/2024, 21:28:13 UTC)
Source: CVE Database V5
Vendor/Project: 코스모스팜 – Cosmosfarm
Product: 소셜 공유 버튼 By 코스모스팜

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 코스모스팜 &#8211; Cosmosfarm 소셜 공유 버튼 By 코스모스팜 cosmosfarm-share-buttons allows Stored XSS.This issue affects 소셜 공유 버튼 By 코스모스팜: from n/a through <= 1.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 08:53:33 UTC

Technical Analysis

CVE-2024-53745 is a stored Cross-site Scripting (XSS) vulnerability found in the Cosmosfarm social share buttons plugin (소셜 공유 버튼 By 코스모스팜), a tool commonly used to add social media sharing functionality to websites. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored persistently on the affected site. When other users visit the compromised pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, unauthorized actions on behalf of users, or distribution of malware. This vulnerability affects all versions of the plugin up to and including version 1.9. No authentication or special user interaction beyond visiting the infected page is required to trigger the exploit, increasing its risk profile. Although no active exploitation has been reported yet, the stored XSS nature makes it a critical concern for websites using this plugin. The vulnerability was publicly disclosed on December 1, 2024, but no official patches or mitigations have been linked yet. The plugin is primarily used on Korean-language websites but may also be installed on international sites using WordPress or similar CMS platforms. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

The stored XSS vulnerability in the Cosmosfarm social share buttons plugin can have significant impacts on affected organizations worldwide. Attackers can inject persistent malicious scripts that execute in the browsers of site visitors, leading to theft of session cookies, personal data, or credentials. This can result in unauthorized access to user accounts, data breaches, and reputational damage. Additionally, attackers may deface websites or use them as vectors to distribute malware, further compromising user security. The vulnerability undermines the confidentiality and integrity of user interactions with affected websites and can also impact availability if attackers leverage the exploit to conduct further attacks such as phishing or drive-by downloads. Organizations relying on this plugin for social sharing functionality face increased risk, especially if they have high traffic volumes or handle sensitive user data. The ease of exploitation without authentication or user interaction broadens the attack surface, making it a critical threat to web platforms using this plugin.

Mitigation Recommendations

1. Monitor the vendor's official channels for patches addressing CVE-2024-53745 and apply them immediately upon release. 2. Until patches are available, implement strict input validation on all user-supplied data fields related to the plugin to block malicious scripts. 3. Apply output encoding/escaping techniques on all data rendered by the plugin to neutralize potentially harmful content. 4. Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the plugin. 5. Conduct regular security audits and penetration testing focused on XSS vulnerabilities in web applications using this plugin. 6. Educate website administrators and developers about the risks of stored XSS and secure coding practices. 7. Consider temporarily disabling or replacing the plugin with a more secure alternative if immediate patching is not feasible. 8. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites. 9. Monitor website logs and user reports for suspicious activity that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-22T13:51:57.972Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd755ee6bfc5ba1df04814

Added to database: 4/1/2026, 7:43:26 PM

Last enriched: 4/2/2026, 8:53:33 AM

Last updated: 4/4/2026, 8:24:37 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses