First published: Fri Feb 21 2025(Updated: )
The Ziggeo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ziggeo_event' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ziggeo Ziggeo | <=3.1 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12452 is categorized as a high-severity vulnerability due to its potential for exploiting stored cross-site scripting.
To resolve CVE-2024-12452, update the Ziggeo plugin for WordPress to version 3.2 or later, which includes necessary input sanitization and output escaping.
CVE-2024-12452 affects all versions of the Ziggeo plugin for WordPress up to and including version 3.1.
CVE-2024-12452 is a Stored Cross-Site Scripting (XSS) vulnerability that arises from insufficient input validation.
The Ziggeo development team is responsible for addressing CVE-2024-12452 by releasing security patches for the plugin.