Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24630: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Design Stylish Cost Calculator

0
Medium
VulnerabilityCVE-2026-24630cvecve-2026-24630
Published: Fri Jan 23 2026 (01/23/2026, 14:29:08 UTC)
Source: CVE Database V5
Vendor/Project: Design
Product: Stylish Cost Calculator

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Design Stylish Cost Calculator stylish-cost-calculator allows Stored XSS.This issue affects Stylish Cost Calculator: from n/a through <= 8.1.8.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:06:51 UTC

Technical Analysis

CVE-2026-24630 identifies a Stored Cross-site Scripting (XSS) vulnerability in the Design Stylish Cost Calculator plugin, which is used to provide cost calculation functionalities on websites. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored persistently within the application. When other users access the affected pages, the malicious scripts execute in their browsers under the context of the vulnerable site. This can lead to a range of attacks including theft of session cookies, redirection to malicious sites, or unauthorized actions performed on behalf of the victim user. The vulnerability affects all versions up to and including 8.1.8, though the exact initial vulnerable version is unspecified. No public exploits have been reported yet, but the persistent nature of the XSS increases the risk of exploitation once attackers develop reliable payloads. The absence of a CVSS score requires an assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope. Stored XSS vulnerabilities typically have high impact on confidentiality and integrity, do not require authentication, and can be exploited with minimal user interaction, just by visiting a compromised page. This makes the threat significant for websites relying on this plugin, especially those handling sensitive user data or financial transactions. The vulnerability was published in January 2026 by Patchstack, indicating recent discovery and the need for immediate attention by administrators.

Potential Impact

For European organizations, the impact of this Stored XSS vulnerability can be substantial. Attackers exploiting this flaw can hijack user sessions, steal credentials, or perform unauthorized actions, potentially leading to data breaches or financial fraud. Organizations in sectors such as e-commerce, finance, and healthcare that use the Stylish Cost Calculator plugin on their websites are particularly vulnerable. The persistent nature of the XSS means that once injected, malicious scripts can affect multiple users over time, increasing the attack surface. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and incur financial losses. Additionally, attackers could use the vulnerability as a foothold to launch further attacks within the network or to distribute malware. The lack of known exploits in the wild currently limits immediate risk but also means organizations should act proactively before exploitation becomes widespread.

Mitigation Recommendations

Organizations should monitor for updates from the vendor and apply patches promptly once available to remediate the vulnerability. Until a patch is released, administrators should implement strict input validation and output encoding to neutralize potentially malicious inputs. Employing a robust Content Security Policy (CSP) can help mitigate the impact by restricting the execution of unauthorized scripts. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regular security audits and code reviews of the plugin and website can help identify and remediate similar issues. User education about phishing and suspicious links can reduce the risk of successful exploitation. Finally, organizations should monitor logs for unusual activities that may indicate attempted exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-23T12:32:36.810Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69738ae24623b1157c48bd10

Added to database: 1/23/2026, 2:51:14 PM

Last enriched: 1/23/2026, 3:06:51 PM

Last updated: 2/7/2026, 3:50:41 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats