Skip to main content

CVE-2024-10076: CWE-79 Cross-Site Scripting (XSS) in Unknown Jetpack

Medium
VulnerabilityCVE-2024-10076cvecve-2024-10076cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:40 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Jetpack

Description

The Jetpack WordPress plugin before 13.8, Jetpack Boost WordPress plugin before 3.4.8 use regexes in the Site Accelerator features when switching image URLs to their CDN counterpart. Unfortunately, some of them may match patterns it shouldn’t, ultimately making it possible for contributor and above users to perform Stored XSS attacks

AI-Powered Analysis

AILast updated: 07/04/2025, 10:54:59 UTC

Technical Analysis

CVE-2024-10076 is a medium-severity vulnerability affecting the Jetpack WordPress plugin versions prior to 13.8 and Jetpack Boost plugin versions prior to 3.4.8. The vulnerability arises from the way these plugins use regular expressions within their Site Accelerator features to rewrite image URLs to their CDN counterparts. Specifically, the regex patterns employed may erroneously match unintended input, allowing users with contributor-level permissions or higher to inject and store malicious scripts within the website's content. This results in a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79. Stored XSS enables attackers to execute arbitrary JavaScript in the context of other users visiting the affected site, potentially leading to session hijacking, defacement, or further exploitation. The CVSS 3.1 base score is 5.9, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (contributor or above), and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. No known exploits are currently reported in the wild, and no official patches are linked yet, though updates to Jetpack and Jetpack Boost addressing this issue are expected or should be sought. The vulnerability highlights the risk of insufficient input validation and improper regex usage in URL rewriting features, which can be exploited by authorized users to escalate their impact on the site.

Potential Impact

For European organizations using WordPress sites with Jetpack or Jetpack Boost plugins, this vulnerability poses a significant risk. Since contributor-level users can exploit the flaw, insider threats or compromised contributor accounts could lead to persistent XSS attacks. This can result in unauthorized script execution affecting site visitors, including customers and employees, potentially leading to data theft, session hijacking, or malware distribution. The impact extends to brand reputation damage, regulatory compliance issues under GDPR if personal data is compromised, and operational disruptions if the site is defaced or functionality impaired. Given the widespread use of WordPress and Jetpack in Europe, especially among SMEs and public sector websites, the vulnerability could be leveraged to target sensitive information or disrupt services. The requirement for user interaction and privileges somewhat limits the attack surface but does not eliminate risk, particularly in environments with multiple content contributors or less stringent access controls.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify versions of Jetpack and Jetpack Boost plugins in use. Until official patches are released, the following specific mitigations are recommended: 1) Restrict contributor and higher user roles strictly to trusted personnel, minimizing the risk of insider exploitation. 2) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns related to image URL rewriting and script injection attempts. 3) Disable or limit the Site Accelerator features that perform URL rewriting if feasible, especially on sites with multiple contributors. 4) Conduct regular security reviews and scanning for stored XSS payloads in site content. 5) Educate content contributors on safe content practices and the risks of injecting untrusted code. 6) Monitor logs for unusual activities related to image URL manipulations. 7) Plan for prompt plugin updates once patches are available and test updates in staging environments before production deployment. These targeted actions go beyond generic advice by focusing on the specific vector and user roles involved in this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-17T09:02:05.021Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaebf

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 10:54:59 AM

Last updated: 8/7/2025, 5:28:50 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats