CVE-2024-8323: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fatcatapps Pricing Tables WordPress Plugin – Easy Pricing Tables
CVE-2024-8323 is a stored cross-site scripting (XSS) vulnerability in the Pricing Tables WordPress Plugin – Easy Pricing Tables, affecting all versions up to 3. 2. 6. The flaw arises from improper input sanitization and output escaping of the ‘fontFamily’ attribute, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but requiring authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation, especially those with multiple contributors or public-facing sites. The threat primarily affects WordPress sites globally, with higher risk in countries where WordPress market share is significant and where targeted attacks on web infrastructure are common.
AI Analysis
Technical Summary
CVE-2024-8323 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Pricing Tables WordPress Plugin – Easy Pricing Tables developed by fatcatapps. The vulnerability exists due to insufficient sanitization and escaping of the 'fontFamily' attribute input, which is used during web page generation. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into the plugin’s fontFamily field. Because the injected script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the user. The vulnerability affects all versions up to and including 3.2.6. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. The vulnerability does not currently have publicly known exploits, but the ease of exploitation by authenticated users and the persistent nature of stored XSS make it a significant risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-8323 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s browser, which can lead to session hijacking, theft of sensitive information such as cookies or credentials, defacement of web pages, or redirection to malicious sites. Since the vulnerability requires authenticated access at Contributor level or above, the risk is elevated in environments with multiple content contributors or where user roles are not tightly controlled. The scope change indicated in the CVSS vector means the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the entire site or user base. Although availability is not directly impacted, the reputational damage and potential data breaches can have severe consequences for organizations. This threat is particularly concerning for organizations relying on WordPress for public-facing websites, e-commerce, or customer portals, where trust and data protection are critical.
Mitigation Recommendations
Organizations should immediately review user roles and permissions to ensure that only trusted users have Contributor-level or higher access. Implement strict input validation and output encoding for all user-supplied data, especially in custom or third-party plugins like Easy Pricing Tables. Monitor and audit plugin usage and content changes for suspicious activity. Since no official patch is currently linked, consider temporarily disabling or removing the affected plugin until a vendor patch is released. Employ Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the fontFamily attribute or related plugin parameters. Educate content contributors about the risks of injecting untrusted content and enforce security best practices in content management. Regularly update WordPress core, themes, and plugins to reduce exposure to known vulnerabilities. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-8323: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fatcatapps Pricing Tables WordPress Plugin – Easy Pricing Tables
Description
CVE-2024-8323 is a stored cross-site scripting (XSS) vulnerability in the Pricing Tables WordPress Plugin – Easy Pricing Tables, affecting all versions up to 3. 2. 6. The flaw arises from improper input sanitization and output escaping of the ‘fontFamily’ attribute, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but requiring authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation, especially those with multiple contributors or public-facing sites. The threat primarily affects WordPress sites globally, with higher risk in countries where WordPress market share is significant and where targeted attacks on web infrastructure are common.
AI-Powered Analysis
Technical Analysis
CVE-2024-8323 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Pricing Tables WordPress Plugin – Easy Pricing Tables developed by fatcatapps. The vulnerability exists due to insufficient sanitization and escaping of the 'fontFamily' attribute input, which is used during web page generation. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into the plugin’s fontFamily field. Because the injected script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the user. The vulnerability affects all versions up to and including 3.2.6. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. The vulnerability does not currently have publicly known exploits, but the ease of exploitation by authenticated users and the persistent nature of stored XSS make it a significant risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-8323 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s browser, which can lead to session hijacking, theft of sensitive information such as cookies or credentials, defacement of web pages, or redirection to malicious sites. Since the vulnerability requires authenticated access at Contributor level or above, the risk is elevated in environments with multiple content contributors or where user roles are not tightly controlled. The scope change indicated in the CVSS vector means the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the entire site or user base. Although availability is not directly impacted, the reputational damage and potential data breaches can have severe consequences for organizations. This threat is particularly concerning for organizations relying on WordPress for public-facing websites, e-commerce, or customer portals, where trust and data protection are critical.
Mitigation Recommendations
Organizations should immediately review user roles and permissions to ensure that only trusted users have Contributor-level or higher access. Implement strict input validation and output encoding for all user-supplied data, especially in custom or third-party plugins like Easy Pricing Tables. Monitor and audit plugin usage and content changes for suspicious activity. Since no official patch is currently linked, consider temporarily disabling or removing the affected plugin until a vendor patch is released. Employ Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the fontFamily attribute or related plugin parameters. Educate content contributors about the risks of injecting untrusted content and enforce security best practices in content management. Regularly update WordPress core, themes, and plugins to reduce exposure to known vulnerabilities. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-29T20:24:39.590Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c26b7ef31ef0b5607d9
Added to database: 2/25/2026, 9:39:50 PM
Last enriched: 2/26/2026, 3:56:55 AM
Last updated: 2/26/2026, 9:11:21 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
UnknownCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
UnknownCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
UnknownCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
UnknownCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.