VYPR
Medium severity6.5NVD Advisory· Published Nov 19, 2024· Updated Apr 23, 2026

CVE-2024-51873

CVE-2024-51873

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masashi Takizawa Multi-day Booking Calendar multi-day-booking-calendar allows DOM-Based XSS.This issue affects Multi-day Booking Calendar: from n/a through <= 1.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-Based XSS vulnerability in WordPress Multi-day Booking Calendar plugin <=1.0.1 allows attackers to inject malicious scripts via crafted input, requiring user interaction.

Vulnerability

Overview

The Multi-day Booking Calendar plugin for WordPress (versions up to and including 1.0.1) contains a DOM-Based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary JavaScript that executes in the browser context of a victim user [1].

Exploitation

Details

Exploitation requires a privileged user (such as an administrator) to perform an action like clicking a malicious link, visiting a crafted page, or submitting a specially crafted form. Because the vulnerability is DOM-based, the payload is executed client-side after the page loads, bypassing server-side filters [1]. The attack does not require direct network access to the server but relies on social engineering to trigger the malicious action.

Impact

Successful exploitation allows an attacker to inject malicious scripts, which can be used to redirect visitors to malicious sites, display unwanted advertisements, steal session cookies, or perform other actions within the context of the affected site. The reference notes that such vulnerabilities are frequently used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Mitigation

The vendor has not released a patched version beyond 1.0.1, so users are advised to update the plugin to the latest available version. If an update is not possible, immediate action such as disabling the plugin or seeking assistance from a hosting provider or web developer is recommended [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.