Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8323: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fatcatapps Pricing Tables WordPress Plugin – Easy Pricing Tables

0
Medium
VulnerabilityCVE-2024-8323cvecve-2024-8323cwe-79
Published: Wed Nov 06 2024 (11/06/2024, 11:32:02 UTC)
Source: CVE Database V5
Vendor/Project: fatcatapps
Product: Pricing Tables WordPress Plugin – Easy Pricing Tables

Description

CVE-2024-8323 is a stored cross-site scripting (XSS) vulnerability in the Pricing Tables WordPress Plugin – Easy Pricing Tables, affecting all versions up to 3. 2. 6. The flaw arises from improper input sanitization and output escaping of the ‘fontFamily’ attribute, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but requiring authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation, especially those with multiple contributors or public-facing sites. The threat primarily affects WordPress sites globally, with higher risk in countries where WordPress market share is significant and where targeted attacks on web infrastructure are common.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:56:55 UTC

Technical Analysis

CVE-2024-8323 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Pricing Tables WordPress Plugin – Easy Pricing Tables developed by fatcatapps. The vulnerability exists due to insufficient sanitization and escaping of the 'fontFamily' attribute input, which is used during web page generation. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into the plugin’s fontFamily field. Because the injected script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the user. The vulnerability affects all versions up to and including 3.2.6. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. The vulnerability does not currently have publicly known exploits, but the ease of exploitation by authenticated users and the persistent nature of stored XSS make it a significant risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-8323 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s browser, which can lead to session hijacking, theft of sensitive information such as cookies or credentials, defacement of web pages, or redirection to malicious sites. Since the vulnerability requires authenticated access at Contributor level or above, the risk is elevated in environments with multiple content contributors or where user roles are not tightly controlled. The scope change indicated in the CVSS vector means the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the entire site or user base. Although availability is not directly impacted, the reputational damage and potential data breaches can have severe consequences for organizations. This threat is particularly concerning for organizations relying on WordPress for public-facing websites, e-commerce, or customer portals, where trust and data protection are critical.

Mitigation Recommendations

Organizations should immediately review user roles and permissions to ensure that only trusted users have Contributor-level or higher access. Implement strict input validation and output encoding for all user-supplied data, especially in custom or third-party plugins like Easy Pricing Tables. Monitor and audit plugin usage and content changes for suspicious activity. Since no official patch is currently linked, consider temporarily disabling or removing the affected plugin until a vendor patch is released. Employ Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the fontFamily attribute or related plugin parameters. Educate content contributors about the risks of injecting untrusted content and enforce security best practices in content management. Regularly update WordPress core, themes, and plugins to reduce exposure to known vulnerabilities. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-29T20:24:39.590Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c26b7ef31ef0b5607d9

Added to database: 2/25/2026, 9:39:50 PM

Last enriched: 2/26/2026, 3:56:55 AM

Last updated: 2/26/2026, 9:11:21 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats