Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10710: CWE-79 Cross-Site Scripting (XSS) in YaDisk Files

0
Low
VulnerabilityCVE-2024-10710cvecve-2024-10710cwe-79
Published: Mon Nov 25 2024 (11/25/2024, 06:00:05 UTC)
Source: CVE Database V5
Product: YaDisk Files

Description

The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 01/09/2026, 20:47:00 UTC

Technical Analysis

CVE-2024-10710 identifies a stored Cross-Site Scripting (XSS) vulnerability in the YaDisk Files WordPress plugin through version 1.2.5. The root cause is the plugin's failure to sanitize and escape certain settings inputs, which allows high privilege users, such as administrators, to inject malicious JavaScript code that is stored and later executed in the context of other users or administrators. This vulnerability is notable because it bypasses the typical WordPress security control that disables unfiltered_html capability, which normally prevents such script injections in multisite environments. The attack vector requires authenticated high privilege access and user interaction, limiting the scope of exploitation. The CVSS 3.1 base score of 3.5 reflects the low severity, considering the attack complexity is low but privileges and user interaction are required. The vulnerability impacts confidentiality and integrity by potentially allowing script execution that could steal cookies, perform actions on behalf of admins, or deface the site. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is used in WordPress environments, which are widely deployed across Europe, especially in small to medium enterprises and public sector websites.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of WordPress sites using the YaDisk Files plugin. Since exploitation requires high privilege access, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could lead to session hijacking, unauthorized actions, or defacement, potentially damaging organizational reputation and trust. Public sector and commercial websites relying on WordPress with this plugin may face targeted attacks aiming to disrupt services or steal sensitive information. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially in environments with multiple administrators or less stringent access controls. Organizations in Europe with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized data manipulation.

Mitigation Recommendations

1. Immediately update the YaDisk Files plugin to the latest version once a patch is released by the vendor. 2. Until a patch is available, restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as MFA. 3. Regularly audit user roles and permissions to minimize the number of high privilege users. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting plugin settings. 5. Monitor WordPress logs and admin activity for unusual behavior or unexpected changes in plugin settings. 6. Educate administrators about the risks of stored XSS and safe plugin configuration practices. 7. Consider isolating critical WordPress instances or using security plugins that sanitize inputs and outputs at multiple layers. 8. Backup WordPress sites regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2024-11-01T19:54:45.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961693845ea0302aa73d9d0

Added to database: 1/9/2026, 8:46:48 PM

Last enriched: 1/9/2026, 8:47:00 PM

Last updated: 1/10/2026, 8:21:32 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats