VYPR
High severity7.1NVD Advisory· Published Oct 6, 2024· Updated Apr 23, 2026

CVE-2024-47339

CVE-2024-47339

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JWardee WP Mail Catcher wp-mail-catcher allows Reflected XSS.This issue affects WP Mail Catcher: from n/a through <= 2.1.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WP Mail Catcher plugin <=2.1.9 allows unauthenticated attackers to inject arbitrary web scripts via improper input neutralization.

Vulnerability

Overview The WP Mail Catcher WordPress plugin versions up to and including 2.1.9 suffer from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. This flaw arises when the plugin fails to sanitize or escape data before including it in output, enabling injection of arbitrary HTML and JavaScript code [1].

Exploitation

Details The vulnerability is classified as reflected XSS, meaning an attacker must trick a victim into clicking a crafted link or visiting a maliciously prepared page. No authentication is required, so any website visitor can be targeted. The attack surface is the plugin's administrative or public-facing pages that reflect input without proper encoding, allowing script execution in the context of the victim's browser session [1].

Impact

Successful exploitation could allow an attacker to inject malicious scripts—such as redirects, advertisements, or other HTML payloads—which execute when the victim loads the affected page. This can lead to session hijacking, credential theft, defacement, or further compromise of the WordPress site. The vulnerability is rated moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of sites [1].

Mitigation

The vendor has released version 2.1.10 which resolves the issue. Users are strongly advised to update immediately. For sites unable to update immediately, Patchstack has issued a mitigation rule to block attacks until a patched version can be applied [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.