Cyber Posture

CVE-2024-12321

HighPublic PoC

Published: 27 January 2025

Published
27 January 2025
Modified
13 May 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 26.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

The WC Affiliate WordPress plugin through 2.3.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

Security Summary

CVE-2024-12321 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, in the WC Affiliate WordPress plugin through version 2.3.9. The flaw arises because the plugin does not sanitize and escape a parameter before outputting it back in the page, enabling malicious script injection. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting network accessibility, low attack complexity, no required privileges, user interaction dependency, and changed scope with low impacts across confidentiality, integrity, and availability.

Any unauthenticated remote attacker can exploit this vulnerability by crafting a malicious URL or payload that includes the unsanitized parameter. The attack requires tricking a targeted high-privilege user, such as an admin, into visiting the malicious page via social engineering, such as phishing. Upon interaction, the injected script executes in the victim's browser context, potentially allowing session token theft, account takeover, or further site compromise leveraging the victim's elevated permissions.

Advisories detailing mitigation are available from WPScan at https://wpscan.com/vulnerability/d4c55d30-1c15-41ee-95e0-670891d67684/. Security practitioners should consult these references for patch availability, workaround guidance, and affected configurations.

Details

CWE(s)
CWE-79

Affected Products

codexpert
wc affiliate
≤ 2.4

References