Skip to main content

CVE-2024-0852: CWE-79 Cross-Site Scripting (XSS) in Unknown coreActivity: Activity Logging for WordPress

Medium
VulnerabilityCVE-2024-0852cvecve-2024-0852cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:09:31 UTC)
Source: CVE
Vendor/Project: Unknown
Product: coreActivity: Activity Logging for WordPress

Description

The coreActivity: Activity Logging for WordPress plugin before 1.8.1 does not escape some request data when outputting it back in the admin dashboard, allowing unauthenticated users to perform Stored XSS attack against high privilege users such as admin

AI-Powered Analysis

AILast updated: 07/04/2025, 16:41:15 UTC

Technical Analysis

CVE-2024-0852 is a stored Cross-Site Scripting (XSS) vulnerability identified in the coreActivity: Activity Logging plugin for WordPress, affecting versions prior to 1.8.1. This vulnerability arises because the plugin fails to properly escape certain request data before rendering it in the WordPress admin dashboard. As a result, an unauthenticated attacker can inject malicious JavaScript payloads that are stored and later executed in the browsers of high-privilege users, such as administrators, when they view the affected dashboard pages. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. Exploitation requires no authentication but does require that the victim user interacts with the compromised admin interface, typically by viewing the affected activity logs. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No known exploits have been reported in the wild yet. The vulnerability could allow attackers to execute arbitrary scripts in the context of the admin user, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment. The plugin is used to log and display activity within WordPress, and the vulnerability stems from insufficient output encoding of user-supplied data in the admin interface. No official patches or updates are linked yet, but upgrading to version 1.8.1 or later is implied to remediate the issue.

Potential Impact

For European organizations using WordPress with the coreActivity: Activity Logging plugin, this vulnerability poses a moderate risk. Since the attack vector is unauthenticated and remote, any public-facing WordPress site with this plugin version is exposed. Successful exploitation could lead to compromise of administrator sessions, allowing attackers to manipulate site content, install backdoors, or exfiltrate sensitive data. This is particularly concerning for organizations handling personal data under GDPR, as unauthorized access or data leakage could result in regulatory penalties. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the entire WordPress installation. However, the requirement for user interaction (the admin must view the maliciously crafted logs) somewhat limits the immediacy of exploitation. Still, given the widespread use of WordPress in Europe for business, government, and e-commerce sites, the vulnerability could be leveraged in targeted attacks against high-value targets. The absence of known exploits in the wild suggests limited current active exploitation, but the medium severity and ease of attack warrant prompt attention.

Mitigation Recommendations

European organizations should immediately verify if the coreActivity: Activity Logging plugin is installed and identify the version in use. If the version is prior to 1.8.1, they should upgrade to the latest version as soon as it becomes available. In the absence of an official patch, temporary mitigations include disabling the plugin or restricting access to the WordPress admin dashboard to trusted IP addresses via firewall or VPN. Additionally, implementing Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the plugin’s logging endpoints can reduce risk. Administrators should be trained to avoid clicking on suspicious log entries and to monitor logs for unusual activity. Regular backups and session management policies (such as forced logout on suspicious activity) can limit damage. Finally, applying Content Security Policy (CSP) headers to restrict the execution of inline scripts in the admin interface can mitigate the impact of XSS payloads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-01-24T08:26:22.019Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebccf

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:41:15 PM

Last updated: 8/16/2025, 8:00:33 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats