CVE-2024-12633
Published: 07 January 2025
Summary
CVE-2024-12633 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.1 (High).
Operationally, ranked in the top 22.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation and sanitization of inputs like the 'page' parameter to block injection of arbitrary web scripts.
Requires filtering and escaping of information outputs to prevent reflected XSS payloads from executing in users' browsers.
Ensures identification, reporting, and correction of flaws like this XSS vulnerability through timely patching of the affected WordPress plugin.
NVD Description
The JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page parameter in all versions up to, and including, 5.6.17 due to insufficient input sanitization and output…
more
escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Deeper analysisAI
CVE-2024-12633 is a reflected cross-site scripting (XSS) vulnerability in the JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress, affecting all versions up to and including 5.6.17. The issue arises from insufficient input sanitization and output escaping of the 'page' parameter, allowing arbitrary web scripts to be injected into pages.
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no privileges required, but it necessitates user interaction such as clicking a malicious link. Successful exploitation leads to script execution in the victim's browser, with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating low impacts on confidentiality, integrity, and availability but elevated severity due to changed scope.
Advisories reference a patch in WordPress plugin Trac changeset 3209054 at https://plugins.trac.wordpress.org/changeset/3209054/joomsport-sports-league-results-management. Additional threat intelligence is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/b4503e2c-0d0d-45de-a597-baace44a98a7?source=cve.
Details
- CWE(s)