- Description
- The Property Hive WordPress plugin before 2.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
- Source
- contact@wpscan.com
- NVD status
- Analyzed
- Products
- propertyhive
CVSS 3.1
- Type
- Secondary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2024-12585 - medium 🚨 PropertyHive < 2.1.1 - Cross-Site Scripting > The Property Hive plugin for WordPress is vulnerable to Reflected Cross-Site Scriptin... 👾 https://t.co/vUUfW2pwMU @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
11 Feb 2026
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12585 Reflected XSS Vulnerability in Property Hive WordPress Plugin Before 2.1.1 The Property Hive WordPress plugin, version 2.1.0 and earlier, has a vulnerability. It does not properly sanitise and esca... https://t.co/tfb2EcypwG
@VulmonFeeds
8 Jan 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12585 The Property Hive WordPress plugin before 2.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scri… https://t.co/01a6hie4RH
@CVEnew
8 Jan 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EB949EFB-2E0C-4306-9895-D824A41469CC",
"versionEndExcluding": "2.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]