CVE-2024-10143: CWE-79 Cross-Site Scripting (XSS) in Unknown MB Custom Post Types & Custom Taxonomies
The MB Custom Post Types & Custom Taxonomies WordPress plugin before 2.7.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-10143 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin MB Custom Post Types & Custom Taxonomies prior to version 2.7.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be exploited even when the unfiltered_html capability is disabled, for example in multisite WordPress environments, which normally restricts HTML input to trusted users. The vulnerability requires high privileges (admin-level) and user interaction (the admin must perform actions that trigger the stored XSS), but it can lead to a scope change where the impact crosses user boundaries (S:C in CVSS), potentially affecting other users who view the malicious content. The CVSS 3.1 score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. The vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or defacement if exploited effectively, especially in multisite setups where multiple sites share the same WordPress installation.
Potential Impact
For European organizations using WordPress multisite environments with the MB Custom Post Types & Custom Taxonomies plugin, this vulnerability poses a moderate risk. Attackers with admin access could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of other users. This could compromise the confidentiality and integrity of organizational data and user accounts. In sectors such as government, finance, healthcare, and media—where WordPress is commonly used for content management—such an attack could disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The requirement for admin privileges limits the risk to insider threats or compromised admin accounts, but the vulnerability still demands attention to prevent lateral movement or privilege escalation within the network.
Mitigation Recommendations
1. Immediate upgrade to MB Custom Post Types & Custom Taxonomies plugin version 2.7.7 or later, where the vulnerability is patched. 2. Restrict admin access strictly using role-based access controls and monitor admin activities to detect suspicious behavior. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 4. Regularly audit and sanitize all plugin settings and custom post type configurations, especially in multisite environments. 5. Employ Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Educate administrators on safe content input practices and the risks of stored XSS. 7. Monitor logs for unusual admin actions or unexpected changes in plugin settings that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-10143: CWE-79 Cross-Site Scripting (XSS) in Unknown MB Custom Post Types & Custom Taxonomies
Description
The MB Custom Post Types & Custom Taxonomies WordPress plugin before 2.7.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-10143 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin MB Custom Post Types & Custom Taxonomies prior to version 2.7.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be exploited even when the unfiltered_html capability is disabled, for example in multisite WordPress environments, which normally restricts HTML input to trusted users. The vulnerability requires high privileges (admin-level) and user interaction (the admin must perform actions that trigger the stored XSS), but it can lead to a scope change where the impact crosses user boundaries (S:C in CVSS), potentially affecting other users who view the malicious content. The CVSS 3.1 score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. The vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or defacement if exploited effectively, especially in multisite setups where multiple sites share the same WordPress installation.
Potential Impact
For European organizations using WordPress multisite environments with the MB Custom Post Types & Custom Taxonomies plugin, this vulnerability poses a moderate risk. Attackers with admin access could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of other users. This could compromise the confidentiality and integrity of organizational data and user accounts. In sectors such as government, finance, healthcare, and media—where WordPress is commonly used for content management—such an attack could disrupt operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The requirement for admin privileges limits the risk to insider threats or compromised admin accounts, but the vulnerability still demands attention to prevent lateral movement or privilege escalation within the network.
Mitigation Recommendations
1. Immediate upgrade to MB Custom Post Types & Custom Taxonomies plugin version 2.7.7 or later, where the vulnerability is patched. 2. Restrict admin access strictly using role-based access controls and monitor admin activities to detect suspicious behavior. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 4. Regularly audit and sanitize all plugin settings and custom post type configurations, especially in multisite environments. 5. Employ Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Educate administrators on safe content input practices and the risks of stored XSS. 7. Monitor logs for unusual admin actions or unexpected changes in plugin settings that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-10-18T17:40:05.711Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaf03
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 10:56:36 AM
Last updated: 11/22/2025, 7:24:47 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.