Skip to main content

CVE-2024-11221: CWE-79 Cross-Site Scripting (XSS) in Unknown Full Screen (Page) Background Image Slideshow

Medium
VulnerabilityCVE-2024-11221cvecve-2024-11221cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:48 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Full Screen (Page) Background Image Slideshow

Description

The Full Screen (Page) Background Image Slideshow WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 06:56:54 UTC

Technical Analysis

CVE-2024-11221 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Full Screen (Page) Background Image Slideshow' through version 1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed in the context of the WordPress site. Notably, this exploit can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress environments, which typically restricts users from adding raw HTML or scripts. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability allows an attacker with admin-level access to inject malicious JavaScript that could execute in other administrators' browsers, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment.

Potential Impact

For European organizations using WordPress sites with the vulnerable 'Full Screen (Page) Background Image Slideshow' plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web platforms. Since exploitation requires high privileges and user interaction, the threat is somewhat limited to insider threats or compromised admin accounts. However, successful exploitation could allow attackers to execute arbitrary scripts, steal session cookies, manipulate site content, or perform actions on behalf of administrators, potentially leading to data breaches or defacement. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could affect organizations handling sensitive personal data under GDPR, increasing regulatory and reputational risks. Multisite WordPress setups, common in large organizations and agencies, are particularly at risk since the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although no active exploits are known, the medium severity and ease of exploitation by privileged users warrant prompt attention to prevent potential targeted attacks.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, identify and inventory all WordPress instances using the 'Full Screen (Page) Background Image Slideshow' plugin and verify the version in use. Since no official patch links are currently available, organizations should consider temporarily disabling or removing the plugin until a vendor patch is released. Restrict administrative access strictly by enforcing strong authentication methods such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Review and harden user roles and capabilities to limit the number of users with high privileges. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. Monitor WordPress logs and admin activity for unusual behavior indicative of attempted exploitation. Additionally, conduct security awareness training for administrators to recognize phishing or social engineering attempts that could lead to credential compromise. Once a patch is available, prioritize its deployment across all affected environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-14T18:01:52.242Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1a7

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:56:54 AM

Last updated: 8/1/2025, 1:33:26 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats