HurryTimer – An Scarcity and Urgency Countdown Timer for WordPress …

HurryTimer – An Scarcity and Urgency Countdown Timer for WordPress …

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-24392 is a medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 6.4) affecting HurryTimer – An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce (slug: hurrytimer) in versions <= 2.14.2. The vulnerability can be exploited by an authenticated user with Author-level permissions (or higher), meaning it is not limited to administrators.

In practical terms, a user who can create or edit content (or otherwise interact with HurryTimer settings/fields that are rendered on the site) could insert malicious script content that gets stored and then executes automatically when other users view the affected page. Because the CVSS vector indicates no user interaction is required (UI:N), the script can execute simply by visiting the page where the injected content is displayed.

Security Weakness

The root cause is insufficient input sanitization and output escaping in HurryTimer versions up to and including 2.14.2. When a plugin accepts content and later displays it on a page, it must properly clean (sanitize) what is saved and safely render (escape) what is shown. If those safeguards are missing or incomplete, an attacker can store web scripts that run in visitors’ browsers under your site’s trusted domain.

This vulnerability is particularly important for organizations where multiple people have publishing access (marketing teams, agencies, contractors, or regional teams). Author-level access is commonly granted for legitimate content workflows, which can increase exposure if an account is compromised or if permissions are broader than necessary.

Technical or Business Impacts

A successful stored XSS attack can create meaningful business risk even when the severity is rated “medium.” Potential impacts include brand damage (malicious popups, redirects, or defacement-like behavior), loss of visitor trust, and campaign disruption if landing pages or product pages are altered in ways that reduce conversions or mislead customers.

Because the injected script runs in a visitor’s browser as if it were part of your site, it can also enable session and account abuse (for example, attempting to act as a logged-in user in the same browser session). For leadership and compliance stakeholders, this can translate into increased incident response costs, potential reporting obligations depending on what data is exposed, and reduced confidence in the integrity of marketing pages and checkout-adjacent experiences.

Remediation: Update HurryTimer to version 2.14.3 or a newer patched release. Also consider reviewing who has Author (and above) access, and whether any third-party accounts or agency logins can be tightened while maintaining marketing velocity.

Similar Attacks

Stored XSS is a common and well-documented web risk pattern. For reference, here are a few real-world examples and resources:

OWASP: Cross Site Scripting (XSS)

CISA Alert: Understanding Web-Based Attacks

CVE Record: CVE-2026-24392

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers