Reflected Cross-Site Scripting Vulnerability in Pago por Redsys Plugin for WordPress
CVE-2024-12467

6.1MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
22 February 2025

What is CVE-2024-12467?

The Pago por Redsys plugin for WordPress is susceptible to Reflected Cross-Site Scripting through the 'Ds_MerchantParameters' parameter. This vulnerability arises from inadequate input sanitization and output escaping in all versions up to and including 1.0.12. Attackers can exploit this weakness to inject arbitrary web scripts into pages, executing the script if a user is deceived into clicking a specially crafted link. This could lead to unauthorized actions being performed in the context of a user's session, potentially compromising sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Pago por Redsys * <= 1.0.12

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

José Aguilera
.