The Open Hours – Easy Opening Hours plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'open-hours-current-status' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/open-hours/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/3feb5f46-e861-40ec-84e8-aade0667eec6?source=cve | Third Party Advisory |
Configurations
History
24 Feb 2025, 14:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/open-hours/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/3feb5f46-e861-40ec-84e8-aade0667eec6?source=cve - Third Party Advisory | |
Summary |
|
|
First Time |
Pixelgrade
Pixelgrade open Hours |
|
CPE | cpe:2.3:a:pixelgrade:open_hours:*:*:*:*:*:wordpress:*:* |
18 Feb 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 05:15
Updated : 2025-02-24 14:24
NVD link : CVE-2024-12813
Mitre link : CVE-2024-12813
CVE.ORG link : CVE-2024-12813
JSON object : View
Products Affected
pixelgrade
- open_hours
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')