CVE-2025-12484
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-19

Last updated on: 2025-11-19

Assigner: Wordfence

Description
The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple social media username parameters in all versions up to, and including, 1.12.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-19
Last Modified
2025-11-19
Generated
2026-05-07
AI Q&A
2025-11-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rafflepress giveaways_and_contests 1.12.19
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12484 is a Stored Cross-Site Scripting (XSS) vulnerability in the RafflePress WordPress plugin (versions up to 1.12.19). It occurs because the plugin does not properly sanitize and escape user inputs, especially multiple social media username parameters. This allows unauthenticated attackers to inject malicious scripts into pages, which execute whenever a user views those pages. The vulnerability arises from insufficient input validation and output escaping in AJAX API endpoints that handle giveaway contestant data, enabling unauthorized manipulation of giveaway entries and contestant confirmation. [1, 4]


How can this vulnerability impact me? :

This vulnerability can allow attackers to inject arbitrary web scripts that execute in the context of users visiting affected pages, potentially leading to theft of user credentials, session hijacking, or unauthorized actions on behalf of users. It also enables unauthorized creation or confirmation of giveaway contestants, manipulation of giveaway entries and actions, abuse of automatic entry actions and newsletter triggers, and exposure of contestant data via API responses. Overall, it compromises the integrity and security of the giveaway system and user data. [1, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2025-12484 involves monitoring for unauthorized or suspicious POST requests to the RafflePress plugin's AJAX API endpoints, especially those related to giveaway contestant confirmation and entry (e.g., endpoints handling 'rafflepress_lite_giveaway_comment' and 'rafflepress_lite_giveaway_api'). Look for POST parameters that include social media username fields or giveaway entry data that might contain injected scripts. Commands to detect such activity could include using network monitoring tools like tcpdump or Wireshark to filter HTTP POST requests to the WordPress site, or using web server logs to search for suspicious POST requests to URLs associated with RafflePress AJAX handlers. Example commands: 1. Using grep on web server logs to find POST requests to rafflepress AJAX endpoints: `grep 'POST.*rafflepress' /var/log/apache2/access.log` 2. Using tcpdump to capture HTTP POST traffic to the server (replace example.com with your domain): `tcpdump -A -s 0 'tcp port 80 and (((ip dst host example.com) and (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354)))'` 3. Searching for suspicious script tags or encoded payloads in POST data within logs or captured traffic. Additionally, reviewing the database tables `rafflepress_contestants` and `rafflepress_entries` for unexpected or malformed entries containing script tags or unusual meta data could help identify exploitation attempts. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the RafflePress plugin to a version later than 1.12.19 where the vulnerability has been patched, as indicated by the security patch that adds proper input sanitization and output escaping. 2. If updating is not immediately possible, restrict access to the AJAX API endpoints related to giveaway entries and contestant confirmation by implementing authentication or IP-based access controls to prevent unauthenticated attackers from exploiting the endpoints. 3. Review and apply security best practices such as enabling WordPress nonces and capability checks on AJAX endpoints to prevent unauthorized requests. 4. Monitor and audit giveaway entries and contestant data for suspicious or injected content and remove any malicious entries. 5. Apply web application firewall (WAF) rules to detect and block attempts to inject scripts via social media username parameters or other input fields. 6. Limit or disable automatic entry actions and newsletter triggers until the vulnerability is resolved to reduce potential abuse. These steps align with the patch details that enforce sanitization and escaping, and restrict debug page access to administrators only. [1, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart