Cyber Posture

CVE-2024-12633

High

Published: 07 January 2025

Published
07 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0107 77.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page parameter in all versions up to, and including, 5.6.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Security Summary

CVE-2024-12633 is a reflected cross-site scripting (XSS) vulnerability in the JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress, affecting all versions up to and including 5.6.17. The issue arises from insufficient input sanitization and output escaping of the 'page' parameter, allowing arbitrary web scripts to be injected into pages.

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no privileges required, but it necessitates user interaction such as clicking a malicious link. Successful exploitation leads to script execution in the victim's browser, with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating low impacts on confidentiality, integrity, and availability but elevated severity due to changed scope.

Advisories reference a patch in WordPress plugin Trac changeset 3209054 at https://plugins.trac.wordpress.org/changeset/3209054/joomsport-sports-league-results-management. Additional threat intelligence is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/b4503e2c-0d0d-45de-a597-baace44a98a7?source=cve.

Details

CWE(s)
CWE-79

References