CVE-2024-11221: CWE-79 Cross-Site Scripting (XSS) in Unknown Full Screen (Page) Background Image Slideshow
The Full Screen (Page) Background Image Slideshow WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-11221 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Full Screen (Page) Background Image Slideshow' through version 1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed in the context of the WordPress site. Notably, this exploit can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress environments, which typically restricts users from adding raw HTML or scripts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability allows an attacker with admin-level access to inject malicious JavaScript that could execute in other administrators' browsers, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable 'Full Screen (Page) Background Image Slideshow' plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web platforms. Since exploitation requires high privileges and user interaction, the threat is somewhat limited to insider threats or compromised admin accounts. However, successful exploitation could allow attackers to execute arbitrary scripts, steal session cookies, manipulate site content, or perform actions on behalf of administrators, potentially leading to data breaches or defacement. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could affect organizations handling sensitive personal data under GDPR, increasing regulatory and reputational risks. Multisite WordPress setups, common in large organizations and agencies, are particularly at risk since the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although no active exploits are known, the medium severity and ease of exploitation by privileged users warrant prompt attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, identify and inventory all WordPress instances using the 'Full Screen (Page) Background Image Slideshow' plugin and verify the version in use. Since no official patch links are currently available, organizations should consider temporarily disabling or removing the plugin until a vendor patch is released. Restrict administrative access strictly by enforcing strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Review and harden user roles and capabilities to limit the number of users with high privileges. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Monitor WordPress logs and admin activity for unusual behavior indicative of attempted exploitation. Additionally, conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Once a patch is available, prioritize its deployment across all affected environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-11221: CWE-79 Cross-Site Scripting (XSS) in Unknown Full Screen (Page) Background Image Slideshow
Description
The Full Screen (Page) Background Image Slideshow WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-11221 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Full Screen (Page) Background Image Slideshow' through version 1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed in the context of the WordPress site. Notably, this exploit can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress environments, which typically restricts users from adding raw HTML or scripts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability allows an attacker with admin-level access to inject malicious JavaScript that could execute in other administrators' browsers, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable 'Full Screen (Page) Background Image Slideshow' plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web platforms. Since exploitation requires high privileges and user interaction, the threat is somewhat limited to insider threats or compromised admin accounts. However, successful exploitation could allow attackers to execute arbitrary scripts, steal session cookies, manipulate site content, or perform actions on behalf of administrators, potentially leading to data breaches or defacement. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could affect organizations handling sensitive personal data under GDPR, increasing regulatory and reputational risks. Multisite WordPress setups, common in large organizations and agencies, are particularly at risk since the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although no active exploits are known, the medium severity and ease of exploitation by privileged users warrant prompt attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, identify and inventory all WordPress instances using the 'Full Screen (Page) Background Image Slideshow' plugin and verify the version in use. Since no official patch links are currently available, organizations should consider temporarily disabling or removing the plugin until a vendor patch is released. Restrict administrative access strictly by enforcing strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Review and harden user roles and capabilities to limit the number of users with high privileges. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Monitor WordPress logs and admin activity for unusual behavior indicative of attempted exploitation. Additionally, conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Once a patch is available, prioritize its deployment across all affected environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-11-14T18:01:52.242Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec1a7
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:56:54 AM
Last updated: 8/1/2025, 1:33:26 AM
Views: 14
Related Threats
CVE-2025-20044: Escalation of Privilege in Intel(R) TDX Module firmware
MediumCVE-2025-49568: Use After Free (CWE-416) in Adobe Illustrator
MediumCVE-2025-49567: NULL Pointer Dereference (CWE-476) in Adobe Illustrator
MediumCVE-2025-49564: Stack-based Buffer Overflow (CWE-121) in Adobe Illustrator
HighCVE-2025-49563: Out-of-bounds Write (CWE-787) in Adobe Illustrator
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.