VYPR
High severity7.1NVD Advisory· Published Nov 20, 2024· Updated Apr 23, 2026

CVE-2024-52472

CVE-2024-52472

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Weather Atlas Weather Atlas Widget weather-atlas allows Reflected XSS.This issue affects Weather Atlas Widget: from n/a through <= 3.0.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Weather Atlas Widget allows unauthenticated attackers to inject malicious scripts via improper input neutralization, affecting versions up to 3.0.3.

Vulnerability

Overview The Weather Atlas Widget plugin for WordPress versions up to 3.0.3 contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables an attacker to inject arbitrary HTML and JavaScript into a page, which is then reflected back to the victim's browser. The CVE description classifies this as a reflected XSS issue, indicating that the payload is delivered via a crafted request (e.g., a URL) rather than stored permanently [1].

Attack

Vector and Exploitation Exploitation requires user interaction: a victim must click a malicious link or visit a specially crafted page [1]. No authentication is needed to trigger the vulnerability, though the impact is limited by the fact that the injected script executes in the context of the victim's session. Attackers can leverage this to perform actions such as redirecting users to phishing sites, injecting advertisements, or stealing session cookies [1]. The vulnerability is moderately dangerous and is expected to be used in mass-exploit campaigns targeting numerous WordPress sites regardless of their size or popularity [1].

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the victim's browser, potentially compromising sensitive data, altering page content, or performing unauthorized actions on behalf of the user. While the CVSS score of 7.1 reflects a high-severity issue, the requirement for user interaction reduces the overall risk slightly [1]. Nonetheless, the potential for automated exploitation makes this a significant threat for unpatched sites.

Mitigation

The vulnerability is fixed in version 3.0.4 of the Weather Atlas Widget plugin [1]. Users are strongly advised to update immediately. Hosting providers or web developers can assist if automatic updates are not enabled. Patchstack has also released a virtual mitigation rule to block attacks until the patch is applied [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.