CVE-2024-9872: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vcita Online Booking & Scheduling Calendar for WordPress by vcita
CVE-2024-9872 is a medium severity cross-site scripting (XSS) vulnerability in the vcita Online Booking & Scheduling Calendar WordPress plugin. It affects all versions up to 4. 5. 1 and allows authenticated users with Subscriber-level access or higher to inject malicious scripts due to a missing capability check in the vcita_save_user_data_callback() function. Exploitation requires user interaction and privileges but can lead to unauthorized data modification and settings updates. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching once available and implement strict access controls to mitigate risk. Countries with high WordPress usage and significant vcita plugin adoption are most at risk.
AI Analysis
Technical Summary
CVE-2024-9872 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the vcita Online Booking & Scheduling Calendar plugin for WordPress. The root cause is a missing capability check in the vcita_save_user_data_callback() function, which is responsible for saving user data. This flaw allows authenticated users with Subscriber-level privileges or higher to inject malicious JavaScript code into the plugin's settings or data fields. Because the vulnerability exists in all versions up to and including 4.5.1, any site running these versions is susceptible. The vulnerability requires the attacker to have at least low-level authenticated access, which is common in WordPress environments where subscribers or similar roles exist. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with a scope change. Exploitation could allow attackers to execute arbitrary scripts in the context of the affected site, potentially leading to session hijacking, data theft, or unauthorized changes to plugin settings. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability does not affect availability directly but compromises data integrity and confidentiality, making it a significant risk for organizations relying on this plugin for customer bookings and scheduling.
Potential Impact
The vulnerability allows attackers with minimal authenticated privileges to inject malicious scripts, potentially leading to unauthorized access to sensitive user data, session hijacking, or manipulation of booking and scheduling information. This can undermine customer trust, lead to data breaches, and disrupt business operations relying on the plugin. Since the plugin is used to manage online bookings and scheduling, attackers could alter appointment details or steal personal information, impacting both service providers and their clients. The scope of impact is significant for organizations using WordPress sites with this plugin, especially those handling sensitive customer data or financial transactions. The integrity and confidentiality of data are at risk, which could result in regulatory compliance violations and reputational damage. Although no known exploits are currently in the wild, the medium severity score and ease of exploitation by authenticated users make timely mitigation critical to prevent potential attacks.
Mitigation Recommendations
1. Immediately restrict Subscriber-level and other low-privilege user roles from accessing or modifying vcita plugin settings until a patch is available. 2. Monitor and audit user activities related to the vcita plugin to detect any unauthorized changes or suspicious behavior. 3. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s endpoints. 4. Encourage users to upgrade to the latest plugin version once a patch addressing this vulnerability is released by vcita. 5. Limit the number of users with authenticated access to the WordPress backend, especially those with Subscriber or higher roles, to reduce the attack surface. 6. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 7. Regularly review and harden WordPress user role permissions to ensure least privilege principles are enforced. 8. Educate site administrators and users about the risks of XSS and the importance of cautious interaction with plugin settings and user-generated content.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-9872: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vcita Online Booking & Scheduling Calendar for WordPress by vcita
Description
CVE-2024-9872 is a medium severity cross-site scripting (XSS) vulnerability in the vcita Online Booking & Scheduling Calendar WordPress plugin. It affects all versions up to 4. 5. 1 and allows authenticated users with Subscriber-level access or higher to inject malicious scripts due to a missing capability check in the vcita_save_user_data_callback() function. Exploitation requires user interaction and privileges but can lead to unauthorized data modification and settings updates. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching once available and implement strict access controls to mitigate risk. Countries with high WordPress usage and significant vcita plugin adoption are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-9872 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the vcita Online Booking & Scheduling Calendar plugin for WordPress. The root cause is a missing capability check in the vcita_save_user_data_callback() function, which is responsible for saving user data. This flaw allows authenticated users with Subscriber-level privileges or higher to inject malicious JavaScript code into the plugin's settings or data fields. Because the vulnerability exists in all versions up to and including 4.5.1, any site running these versions is susceptible. The vulnerability requires the attacker to have at least low-level authenticated access, which is common in WordPress environments where subscribers or similar roles exist. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with a scope change. Exploitation could allow attackers to execute arbitrary scripts in the context of the affected site, potentially leading to session hijacking, data theft, or unauthorized changes to plugin settings. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability does not affect availability directly but compromises data integrity and confidentiality, making it a significant risk for organizations relying on this plugin for customer bookings and scheduling.
Potential Impact
The vulnerability allows attackers with minimal authenticated privileges to inject malicious scripts, potentially leading to unauthorized access to sensitive user data, session hijacking, or manipulation of booking and scheduling information. This can undermine customer trust, lead to data breaches, and disrupt business operations relying on the plugin. Since the plugin is used to manage online bookings and scheduling, attackers could alter appointment details or steal personal information, impacting both service providers and their clients. The scope of impact is significant for organizations using WordPress sites with this plugin, especially those handling sensitive customer data or financial transactions. The integrity and confidentiality of data are at risk, which could result in regulatory compliance violations and reputational damage. Although no known exploits are currently in the wild, the medium severity score and ease of exploitation by authenticated users make timely mitigation critical to prevent potential attacks.
Mitigation Recommendations
1. Immediately restrict Subscriber-level and other low-privilege user roles from accessing or modifying vcita plugin settings until a patch is available. 2. Monitor and audit user activities related to the vcita plugin to detect any unauthorized changes or suspicious behavior. 3. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s endpoints. 4. Encourage users to upgrade to the latest plugin version once a patch addressing this vulnerability is released by vcita. 5. Limit the number of users with authenticated access to the WordPress backend, especially those with Subscriber or higher roles, to reduce the attack surface. 6. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 7. Regularly review and harden WordPress user role permissions to ensure least privilege principles are enforced. 8. Educate site administrators and users about the risks of XSS and the importance of cautious interaction with plugin settings and user-generated content.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-10-11T15:03:37.209Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b62b7ef31ef0b554dd8
Added to database: 2/25/2026, 9:36:34 PM
Last enriched: 2/25/2026, 11:44:50 PM
Last updated: 2/26/2026, 6:17:17 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.