Skip to main content

CVE-2024-12679: CWE-79 Cross-Site Scripting (XSS) in Unknown Prisna GWT

Medium
VulnerabilityCVE-2024-12679cvecve-2024-12679cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:53 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Prisna GWT

Description

The Prisna GWT WordPress plugin before 1.4.14 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:10:32 UTC

Technical Analysis

CVE-2024-12679 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Prisna GWT WordPress plugin versions prior to 1.4.14. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this can occur even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The vulnerability is a stored XSS, meaning the malicious script is saved on the server and executed whenever a victim views the affected page or interface. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based (remote), requires high privileges, user interaction, and results in limited confidentiality and integrity impact without affecting availability. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. There are no known exploits in the wild as of now, and no official patches or updates have been linked yet. The vulnerability could be leveraged by an attacker with admin access to execute arbitrary JavaScript in the context of other administrators or users viewing the affected settings, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site.

Potential Impact

For European organizations using WordPress sites with the Prisna GWT plugin, this vulnerability poses a risk primarily if an attacker can gain or already has administrative access. In environments such as multisite WordPress installations common in enterprises, the inability to rely on 'unfiltered_html' as a safeguard increases risk. Exploitation could lead to unauthorized actions performed by administrators, theft of sensitive information, or further malware deployment within the site. This could impact the confidentiality and integrity of organizational data and damage trust with users or customers. Given the widespread use of WordPress across European businesses, especially in sectors like e-commerce, media, and public services, exploitation could disrupt operations and lead to reputational damage. However, since exploitation requires high privileges and user interaction, the threat is somewhat contained to insider threats or attackers who have already compromised admin credentials.

Mitigation Recommendations

European organizations should immediately verify if they use the Prisna GWT plugin on their WordPress installations and identify the version. Until an official patch is released, administrators should restrict plugin access to the minimum number of trusted users and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all admin accounts. Regularly audit user privileges to ensure no unauthorized users have admin rights. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. Additionally, monitor logs for unusual admin activity and consider using Web Application Firewalls (WAFs) that can detect and block XSS payloads. When a patch becomes available, prioritize immediate updating of the plugin. For multisite setups, extra caution should be taken to review site settings for any injected scripts and sanitize stored data manually if needed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-12-16T16:23:49.187Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1ca

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:10:32 AM

Last updated: 7/31/2025, 6:43:07 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats