Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in quantumcloud iChart – Easy Charts and Graphs

0
Medium
VulnerabilityCVE-2024-11928cvecve-2024-11928cwe-79
Published: Tue Dec 10 2024 (12/10/2024, 11:09:11 UTC)
Source: CVE Database V5
Vendor/Project: quantumcloud
Product: iChart – Easy Charts and Graphs

Description

CVE-2024-11928 is a stored cross-site scripting (XSS) vulnerability in the iChart – Easy Charts and Graphs WordPress plugin by quantumcloud, affecting all versions up to 2. 1. 0. The flaw arises from improper sanitization and escaping of the 'width' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:28:02 UTC

Technical Analysis

CVE-2024-11928 is a stored cross-site scripting vulnerability classified under CWE-79, found in the iChart – Easy Charts and Graphs plugin for WordPress, developed by quantumcloud. The vulnerability exists in all versions up to and including 2.1.0 due to insufficient input sanitization and output escaping of the 'width' parameter. This parameter is used during web page generation, and because it is not properly neutralized, an authenticated attacker with Contributor-level or higher privileges can inject arbitrary JavaScript code into pages. These malicious scripts are stored persistently and executed in the context of any user who accesses the infected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of the victim. The vulnerability requires authentication but no user interaction to trigger the payload once the page is accessed. The CVSS 3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the vulnerable component. No patches or exploits are currently publicly available, but the risk remains significant due to the plugin’s usage in WordPress environments.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the browsers of users visiting compromised pages. This can lead to session hijacking, theft of sensitive information such as authentication tokens, unauthorized actions performed on behalf of users, and defacement of website content. Since the vulnerability requires only Contributor-level access, an attacker who gains such access—potentially through compromised credentials or social engineering—can exploit it without needing administrative privileges. This broadens the attack surface within organizations using the plugin. The vulnerability affects the confidentiality and integrity of user data and can undermine trust in affected websites. Although availability is not directly impacted, the reputational damage and potential data breaches can have significant operational and financial consequences. Organizations running WordPress sites with this plugin are at risk, especially those with multiple contributors or less stringent access controls.

Mitigation Recommendations

1. Immediate mitigation involves upgrading the iChart – Easy Charts and Graphs plugin to a version where this vulnerability is fixed once available. Since no patch links are currently provided, monitor vendor announcements closely. 2. Restrict Contributor-level and higher access to trusted users only, enforcing strong authentication and regular credential audits. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'width' parameter or typical XSS patterns in HTTP requests. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5. Conduct regular security reviews and scanning of WordPress plugins to identify vulnerable components. 6. Educate site administrators and contributors about the risks of XSS and safe input handling. 7. Consider temporarily disabling or removing the plugin if immediate patching is not feasible and the risk is unacceptable. 8. Monitor logs for unusual activity or attempts to exploit the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-27T19:38:07.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e27b7ef31ef0b596de4

Added to database: 2/25/2026, 9:48:23 PM

Last enriched: 2/26/2026, 7:28:02 AM

Last updated: 2/26/2026, 9:44:11 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats