Skip to main content

CVE-2024-11190: CWE-79 Cross-Site Scripting (XSS) in Unknown jwp-a11y

Medium
VulnerabilityCVE-2024-11190cvecve-2024-11190cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:48 UTC)
Source: CVE
Vendor/Project: Unknown
Product: jwp-a11y

Description

The jwp-a11y WordPress plugin through 4.1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 06:56:41 UTC

Technical Analysis

CVE-2024-11190 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the jwp-a11y WordPress plugin up to version 4.1.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains exploitable even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts HTML input to trusted users. The vulnerability requires high privilege (admin) and user interaction (an admin must save malicious input), but it can lead to stored XSS attacks that execute in the context of other administrators or users viewing the affected settings pages. The CVSS 3.1 base score is 4.8, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity, as malicious scripts could steal session tokens, perform actions on behalf of admins, or modify content. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches or vendor advisories have been linked yet. The vulnerability is specific to the jwp-a11y plugin, which is designed to improve accessibility in WordPress sites, but the exact market penetration and usage statistics are not provided.

Potential Impact

For European organizations using WordPress with the jwp-a11y plugin, this vulnerability poses a risk of privilege escalation through stored XSS attacks. If exploited, attackers with admin access could execute arbitrary JavaScript in the context of other administrators or privileged users, potentially leading to session hijacking, unauthorized actions, or data leakage. This is particularly concerning for organizations managing multisite WordPress installations, common in large enterprises and public sector entities across Europe, where the unfiltered_html capability is often restricted. The confidentiality and integrity of sensitive data managed via WordPress could be compromised, impacting trust and compliance with data protection regulations such as GDPR. However, since exploitation requires admin privileges and user interaction, the threat is somewhat limited to insider threats or compromised admin accounts. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the jwp-a11y plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin if it is not essential. For sites requiring the plugin, restrict admin access strictly and monitor for unusual admin activity. Implement Content Security Policy (CSP) headers to mitigate the impact of potential XSS payloads. Additionally, review and sanitize all plugin settings inputs manually if possible. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings. Regularly update WordPress core and plugins and subscribe to vulnerability feeds for timely patching once fixes become available. Conduct security awareness training for administrators to recognize and avoid introducing malicious inputs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-13T18:21:05.882Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1a5

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:56:41 AM

Last updated: 7/31/2025, 3:25:38 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats