Skip to main content

CVE-2024-10632: CWE-79 Cross-Site Scripting (XSS) in Unknown Nokaut Offers Box

Medium
VulnerabilityCVE-2024-10632cvecve-2024-10632cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Nokaut Offers Box

Description

The Nokaut Offers Box WordPress plugin through 1.4.0 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 06:54:55 UTC

Technical Analysis

CVE-2024-10632 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Nokaut Offers Box WordPress plugin up to version 1.4.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this exploit can be performed even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The vulnerability requires high privileges (admin-level access) and some user interaction to trigger the stored XSS payload, which can lead to a scope change affecting the entire WordPress site. The CVSS 3.1 base score is 4.8, reflecting a medium severity level with low attack complexity and network attack vector. The impact includes potential confidentiality and integrity loss, such as session hijacking, privilege escalation, or defacement, but no direct availability impact is noted. No known public exploits are reported yet, and no patches or fixes have been linked at the time of publication. The vulnerability was reserved in late 2024 and published in mid-2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations using WordPress sites with the Nokaut Offers Box plugin, this vulnerability poses a risk primarily when an attacker or insider has administrative access. Exploitation could lead to stored XSS attacks that compromise administrator sessions or inject malicious scripts affecting site visitors or other admins. This could result in data leakage, unauthorized actions, or defacement, undermining trust and compliance with data protection regulations such as GDPR. Multisite WordPress setups, common in larger organizations and agencies, are particularly at risk since the vulnerability bypasses unfiltered_html restrictions. While the vulnerability does not directly impact availability, the reputational damage and potential data breaches could have significant operational and legal consequences. The medium severity suggests a moderate but non-trivial risk that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Nokaut Offers Box plugin. If found, restrict administrative access to trusted personnel only and monitor for suspicious activity. Since no official patch is currently available, consider temporarily disabling or uninstalling the plugin until a fix is released. Implement Content Security Policy (CSP) headers to mitigate the impact of XSS by restricting script execution sources. Regularly update WordPress core and plugins to minimize exposure to known vulnerabilities. For multisite environments, review and tighten capability assignments and consider additional input validation or sanitization plugins as a stopgap. Conduct thorough security testing on administrative interfaces to detect any stored XSS or similar injection flaws. Finally, maintain robust incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-31T17:58:29.177Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec18c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:54:55 AM

Last updated: 7/31/2025, 4:14:35 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats