Skip to main content

CVE-2024-12680: CWE-79 Cross-Site Scripting (XSS) in Unknown Prisna GWT

Medium
VulnerabilityCVE-2024-12680cvecve-2024-12680cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:53 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Prisna GWT

Description

The Prisna GWT WordPress plugin before 1.4.14 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:10:42 UTC

Technical Analysis

CVE-2024-12680 is a medium-severity vulnerability classified as a Stored Cross-Site Scripting (XSS) issue affecting the Prisna GWT WordPress plugin versions prior to 1.4.14. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high-privilege users, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common restriction in multisite WordPress environments to prevent script injection by users. The vulnerability requires the attacker to have high privileges and some user interaction (e.g., visiting a page where the malicious script executes). The CVSS 3.1 score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, high privileges required, user interaction required, and a scope change. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or further exploitation within the WordPress admin context, especially in multisite setups where restrictions on HTML filtering are expected to mitigate such risks but fail here due to improper sanitization by the plugin.

Potential Impact

For European organizations using WordPress multisite environments with the Prisna GWT plugin, this vulnerability poses a risk of persistent XSS attacks that could compromise administrative accounts. Attackers with admin-level access could leverage this flaw to execute arbitrary JavaScript in the context of the WordPress admin dashboard, potentially leading to session hijacking, unauthorized actions, or distribution of malware to other users. This could result in data leakage, defacement, or further compromise of the website and connected systems. Given the widespread use of WordPress in Europe for corporate, governmental, and public sector websites, exploitation could undermine trust and lead to regulatory consequences under GDPR if personal data is exposed. The requirement for high privileges limits the risk to insider threats or attackers who have already compromised an admin account, but the persistence and stealth of stored XSS make detection and remediation challenging. Multisite setups, common in large organizations and educational institutions, are particularly vulnerable due to the bypass of the unfiltered_html capability restriction.

Mitigation Recommendations

European organizations should immediately verify if they use the Prisna GWT plugin and determine the version in use. Although no official patch links are provided, upgrading to version 1.4.14 or later (once available) is critical to address this vulnerability. Until a patch is released, organizations should restrict admin access strictly to trusted personnel and monitor for unusual admin activity. Implement Content Security Policy (CSP) headers to limit the impact of injected scripts. Regularly audit plugin settings for suspicious content and consider disabling or replacing the Prisna GWT plugin if feasible. Employ web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the plugin's settings. Additionally, enhance logging and alerting on admin actions and review multisite configurations to ensure the principle of least privilege is enforced. Training administrators on secure plugin management and recognizing signs of compromise will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-12-16T16:28:09.647Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1d7

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:10:42 AM

Last updated: 7/28/2025, 4:08:59 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats