CVE-2024-10143: CWE-79 Cross-Site Scripting (XSS) in Unknown MB Custom Post Types & Custom Taxonomies
The MB Custom Post Types & Custom Taxonomies WordPress plugin before 2.7.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-10143 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin MB Custom Post Types & Custom Taxonomies prior to version 2.7.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be exploited even when the unfiltered_html capability is disabled, for example in multisite WordPress environments, which normally restricts HTML input to trusted users. The vulnerability requires high privileges (admin-level) and user interaction (the admin must perform actions that trigger the stored XSS), but it can lead to a scope change where the impact crosses user boundaries (S:C in CVSS), potentially affecting other users who view the malicious content. The CVSS 3.1 score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. The vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or defacement if exploited effectively, especially in multisite setups where multiple sites share the same WordPress installation.
Potential Impact
For European organizations using WordPress multisite environments with the MB Custom Post Types & Custom Taxonomies plugin, this vulnerability poses a moderate risk. Attackers with admin access could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of other users. This could compromise the confidentiality and integrity of organizational data and user accounts. In sectors such as government, finance, healthcare, and media—where WordPress is commonly used for content management—such an attack could disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The requirement for admin privileges limits the risk to insider threats or compromised admin accounts, but the vulnerability still demands attention to prevent lateral movement or privilege escalation within the network.
Mitigation Recommendations
1. Immediate upgrade to MB Custom Post Types & Custom Taxonomies plugin version 2.7.7 or later, where the vulnerability is patched. 2. Restrict admin access strictly using role-based access controls and monitor admin activities to detect suspicious behavior. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 4. Regularly audit and sanitize all plugin settings and custom post type configurations, especially in multisite environments. 5. Employ Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Educate administrators on safe content input practices and the risks of stored XSS. 7. Monitor logs for unusual admin actions or unexpected changes in plugin settings that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-10143: CWE-79 Cross-Site Scripting (XSS) in Unknown MB Custom Post Types & Custom Taxonomies
Description
The MB Custom Post Types & Custom Taxonomies WordPress plugin before 2.7.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-10143 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin MB Custom Post Types & Custom Taxonomies prior to version 2.7.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be exploited even when the unfiltered_html capability is disabled, for example in multisite WordPress environments, which normally restricts HTML input to trusted users. The vulnerability requires high privileges (admin-level) and user interaction (the admin must perform actions that trigger the stored XSS), but it can lead to a scope change where the impact crosses user boundaries (S:C in CVSS), potentially affecting other users who view the malicious content. The CVSS 3.1 score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. The vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or defacement if exploited effectively, especially in multisite setups where multiple sites share the same WordPress installation.
Potential Impact
For European organizations using WordPress multisite environments with the MB Custom Post Types & Custom Taxonomies plugin, this vulnerability poses a moderate risk. Attackers with admin access could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of other users. This could compromise the confidentiality and integrity of organizational data and user accounts. In sectors such as government, finance, healthcare, and media—where WordPress is commonly used for content management—such an attack could disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The requirement for admin privileges limits the risk to insider threats or compromised admin accounts, but the vulnerability still demands attention to prevent lateral movement or privilege escalation within the network.
Mitigation Recommendations
1. Immediate upgrade to MB Custom Post Types & Custom Taxonomies plugin version 2.7.7 or later, where the vulnerability is patched. 2. Restrict admin access strictly using role-based access controls and monitor admin activities to detect suspicious behavior. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 4. Regularly audit and sanitize all plugin settings and custom post type configurations, especially in multisite environments. 5. Employ Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Educate administrators on safe content input practices and the risks of stored XSS. 7. Monitor logs for unusual admin actions or unexpected changes in plugin settings that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-10-18T17:40:05.711Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaf03
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 10:56:36 AM
Last updated: 7/31/2025, 6:11:57 PM
Views: 14
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.