The Open Hours – Easy Opening Hours plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'open-hours-current-status' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/open-hours/ | Product |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/3feb5f46-e861-40ec-84e8-aade0667eec6?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-18 05:15
Updated : 2025-02-24 14:24
NVD link : CVE-2024-12813
Mitre link : CVE-2024-12813
CVE.ORG link : CVE-2024-12813
JSON object : View
Products Affected
pixelgrade
- open_hours
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
