CVE-2024-10710: CWE-79 Cross-Site Scripting (XSS) in YaDisk Files
The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-10710 identifies a stored Cross-Site Scripting (XSS) vulnerability in the YaDisk Files WordPress plugin through version 1.2.5. The root cause is the plugin's failure to sanitize and escape certain settings inputs, which allows high privilege users, such as administrators, to inject malicious JavaScript code that is stored and later executed in the context of other users or administrators. This vulnerability is notable because it bypasses the typical WordPress security control that disables unfiltered_html capability, which normally prevents such script injections in multisite environments. The attack vector requires authenticated high privilege access and user interaction, limiting the scope of exploitation. The CVSS 3.1 base score of 3.5 reflects the low severity, considering the attack complexity is low but privileges and user interaction are required. The vulnerability impacts confidentiality and integrity by potentially allowing script execution that could steal cookies, perform actions on behalf of admins, or deface the site. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is used in WordPress environments, which are widely deployed across Europe, especially in small to medium enterprises and public sector websites.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of WordPress sites using the YaDisk Files plugin. Since exploitation requires high privilege access, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could lead to session hijacking, unauthorized actions, or defacement, potentially damaging organizational reputation and trust. Public sector and commercial websites relying on WordPress with this plugin may face targeted attacks aiming to disrupt services or steal sensitive information. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially in environments with multiple administrators or less stringent access controls. Organizations in Europe with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized data manipulation.
Mitigation Recommendations
1. Immediately update the YaDisk Files plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as MFA. 3. Regularly audit user roles and permissions to minimize the number of high privilege users. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting plugin settings. 5. Monitor WordPress logs and admin activity for unusual behavior or unexpected changes in plugin settings. 6. Educate administrators about the risks of stored XSS and safe plugin configuration practices. 7. Consider isolating critical WordPress instances or using security plugins that sanitize inputs and outputs at multiple layers. 8. Backup WordPress sites regularly to enable quick recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-10710: CWE-79 Cross-Site Scripting (XSS) in YaDisk Files
Description
The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-10710 identifies a stored Cross-Site Scripting (XSS) vulnerability in the YaDisk Files WordPress plugin through version 1.2.5. The root cause is the plugin's failure to sanitize and escape certain settings inputs, which allows high privilege users, such as administrators, to inject malicious JavaScript code that is stored and later executed in the context of other users or administrators. This vulnerability is notable because it bypasses the typical WordPress security control that disables unfiltered_html capability, which normally prevents such script injections in multisite environments. The attack vector requires authenticated high privilege access and user interaction, limiting the scope of exploitation. The CVSS 3.1 base score of 3.5 reflects the low severity, considering the attack complexity is low but privileges and user interaction are required. The vulnerability impacts confidentiality and integrity by potentially allowing script execution that could steal cookies, perform actions on behalf of admins, or deface the site. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is used in WordPress environments, which are widely deployed across Europe, especially in small to medium enterprises and public sector websites.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of WordPress sites using the YaDisk Files plugin. Since exploitation requires high privilege access, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could lead to session hijacking, unauthorized actions, or defacement, potentially damaging organizational reputation and trust. Public sector and commercial websites relying on WordPress with this plugin may face targeted attacks aiming to disrupt services or steal sensitive information. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially in environments with multiple administrators or less stringent access controls. Organizations in Europe with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized data manipulation.
Mitigation Recommendations
1. Immediately update the YaDisk Files plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as MFA. 3. Regularly audit user roles and permissions to minimize the number of high privilege users. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting plugin settings. 5. Monitor WordPress logs and admin activity for unusual behavior or unexpected changes in plugin settings. 6. Educate administrators about the risks of stored XSS and safe plugin configuration practices. 7. Consider isolating critical WordPress instances or using security plugins that sanitize inputs and outputs at multiple layers. 8. Backup WordPress sites regularly to enable quick recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-11-01T19:54:45.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961693845ea0302aa73d9d0
Added to database: 1/9/2026, 8:46:48 PM
Last enriched: 1/9/2026, 8:47:00 PM
Last updated: 1/10/2026, 8:21:32 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15502: OS Command Injection in Sangfor Operation and Maintenance Management System
MediumCVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce
MediumCVE-2026-22777: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Comfy-Org ComfyUI-Manager
HighCVE-2026-22773: CWE-770: Allocation of Resources Without Limits or Throttling in vllm-project vllm
MediumCVE-2025-14943: CWE-863 Incorrect Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.