CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-12519

Medium Severity
SVRS
34/100

CVSSv3
6.4/10

EPSS
0.00036/1

CVE-2024-12519: Stored Cross-Site Scripting (XSS) vulnerability in the TCBD Auto Refresher WordPress plugin. This flaw affects versions 2.0 and earlier, allowing authenticated users with contributor access or higher to inject malicious scripts into website pages. The scripts execute when any user visits the compromised page due to insufficient sanitization and output escaping. The vulnerability arises from the 'tcbd_auto_refresh' shortcode.

Despite a CVSS score of 6.4, the SOCRadar Vulnerability Risk Score (SVRS) is 34, indicating a moderate but not critical risk level. However, the "In The Wild" tag highlights the potential for active exploitation. This CVE poses a significant risk as attackers could potentially hijack user sessions, steal sensitive data, or deface websites. Immediate patching is highly recommended to mitigate this threat.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:C
C:L
I:L
A:N
2025-01-11

2025-01-13
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-12519 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the TCBD Auto Refresher plugin for WordPress. This vulnerability exists in all versions up to and including 2.0 due to insufficient input sanitization and output escaping on user-supplied attributes within the plugin's 'tcbd_auto_refresh' shortcode.

SVRS: The vulnerability has an SVRS score of 34, which indicates a moderate severity and a potential risk requiring attention. While the SVRS is lower than the CVSS score of 6.4, it still signifies the need for timely action and mitigation to prevent potential exploitation.

Key Insights

  1. Attacker Access: This vulnerability can be exploited by authenticated attackers with contributor-level access or higher. This means that even users with limited privileges can potentially inject malicious scripts.
  2. Persistent XSS: The vulnerability allows for the injection of persistent XSS, meaning the malicious script remains embedded in the website and executes whenever a user accesses the affected page. This allows for long-term exploitation and potential data breaches.
  3. Potential Impact: The exploitation of this vulnerability could lead to various consequences, including:
    • Account Takeover: Attackers could gain control of user accounts through session hijacking or credential theft.
    • Data Exfiltration: Sensitive data stored on the website could be stolen.
    • Website Defacement: Attackers could alter the appearance and functionality of the website.
    • Malware Distribution: Attackers could use the injected scripts to distribute malware to users.

Mitigation Strategies

  1. Plugin Update: Immediately update the TCBD Auto Refresher plugin to the latest version, which should contain a fix for this vulnerability.
  2. Input Sanitization & Output Escaping: Ensure that the plugin correctly sanitizes and escapes all user-supplied input before displaying it on the website.
  3. Security Auditing: Conduct regular security audits of the website to identify any potential vulnerabilities, including XSS, and implement appropriate mitigation measures.
  4. Web Application Firewall (WAF): Deploy a WAF to filter malicious traffic and prevent the execution of XSS payloads.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-12519 | TCBD Auto Refresher Plugin up to 2.0 on WordPress cross site scripting
vuldb.com2025-01-10
CVE-2024-12519 | TCBD Auto Refresher Plugin up to 2.0 on WordPress cross site scripting | A vulnerability classified as problematic was found in TCBD Auto Refresher Plugin up to 2.0 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-12519. The attack can be launched remotely. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

CVE-2024-12519 The TCBD Auto Refresher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd_auto_refresh' shortcode in all versions up to, and in… https://t.co/9dkb1TBVXU
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/tcbd-auto-refresher/trunk/plugin-hook.php#L115
[email protected]https://wordpress.org/plugins/tcbd-auto-refresher
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/851bade8-bd3a-4fb1-8a1d-12461287694e?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence