Skip to main content

CVE-2024-10362: CWE-79 Cross-Site Scripting (XSS) in Unknown Social Media Share Buttons & Social Sharing Icons

Medium
VulnerabilityCVE-2024-10362cvecve-2024-10362cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:42 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Social Media Share Buttons & Social Sharing Icons

Description

The Social Media Share Buttons & Social Sharing Icons WordPress plugin before 2.9.1 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 06:54:32 UTC

Technical Analysis

CVE-2024-10362 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Social Media Share Buttons & Social Sharing Icons' in versions prior to 2.9.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are stored persistently. Notably, this exploit can be performed even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite environments, thus bypassing a common security control. The attack vector requires network access (remote), low attack complexity, and high privileges, with user interaction required to trigger the malicious payload. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or defacement, but does not affect availability. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 4.8, reflecting a medium severity level due to the requirement of high privileges and user interaction, but with a low attack complexity and potential for impact on confidentiality and integrity. The vulnerability affects all versions before 2.9.1 of the plugin, which is commonly used to add social media sharing functionality to WordPress sites.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the affected plugin installed. Since the exploit requires administrative privileges, the threat is mainly from insider threats or attackers who have already compromised an admin account. Successful exploitation could allow attackers to inject malicious scripts that steal session tokens, manipulate site content, or redirect users to malicious sites, potentially leading to data breaches or reputational damage. Organizations in sectors with strict data protection regulations like GDPR could face compliance issues if personal data is exposed through such attacks. Additionally, multisite WordPress installations, common in large enterprises and educational institutions across Europe, are particularly vulnerable since the vulnerability bypasses the 'unfiltered_html' restriction. The impact on availability is minimal, but the confidentiality and integrity of web content and user data could be compromised, affecting trust and operational security.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately update the 'Social Media Share Buttons & Social Sharing Icons' plugin to version 2.9.1 or later where the issue is fixed. If immediate patching is not possible, restrict administrative access to trusted personnel only and monitor admin activities for suspicious behavior. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns related to XSS payloads in plugin settings. Regularly audit and sanitize all user-generated content and plugin settings, especially in multisite environments. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. Additionally, review and harden WordPress user roles and capabilities to minimize the number of users with high privileges. Conduct security awareness training for administrators to recognize and prevent injection of malicious content.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-24T18:51:17.065Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec188

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:54:32 AM

Last updated: 8/17/2025, 2:01:24 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats