CVE-2024-12770: CWE-79 Cross-Site Scripting (XSS) in Unknown WP ULike
The WP ULike WordPress plugin before 4.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-12770 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP ULike WordPress plugin versions prior to 4.7.6. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress configurations, which typically restricts HTML content to trusted users. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8 (medium severity), with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires high privileges, and user interaction is needed. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Since the vulnerability requires a high-privilege user to perform the attack and user interaction (such as clicking a crafted link) is necessary, exploitation is somewhat constrained. However, successful exploitation could allow an attacker to execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, or further compromise within the WordPress environment. No known exploits are currently reported in the wild, and no official patch links are provided yet. The vulnerability was reserved in December 2024 and published in May 2025.
Potential Impact
For European organizations using WordPress sites with the WP ULike plugin, this vulnerability poses a moderate risk. Since exploitation requires high privileges, the primary threat vector is insider threats or compromised administrator accounts. If exploited, attackers could inject malicious scripts that affect site administrators or other users, potentially leading to session hijacking, unauthorized actions, or data leakage within the WordPress environment. This could undermine trust in the affected websites, lead to defacement, or facilitate further attacks such as phishing or malware distribution. Multisite WordPress setups, common in larger organizations or managed hosting environments, are particularly at risk because the vulnerability bypasses the usual 'unfiltered_html' restrictions. European organizations with public-facing WordPress sites that use WP ULike for user engagement or content interaction should be vigilant, as exploitation could impact confidentiality and integrity of site content and user data. While availability is not directly affected, reputational damage and compliance risks (e.g., GDPR concerns if personal data is exposed) are relevant considerations.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised high-privilege accounts. 2. Monitor and audit administrator activities and plugin settings changes to detect suspicious behavior that might indicate exploitation attempts. 3. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting the execution of unauthorized scripts. 4. Until an official patch is released, consider disabling or removing the WP ULike plugin if it is not critical to operations, or isolate it in a staging environment for testing. 5. Regularly update WordPress core and all plugins, and subscribe to vulnerability disclosure feeds to apply patches promptly once available. 6. For multisite environments, review and tighten capability assignments and consider additional input validation or sanitization at the application or web server level. 7. Educate administrators about the risks of stored XSS and safe handling of plugin settings to avoid inadvertent injection of malicious content.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-12770: CWE-79 Cross-Site Scripting (XSS) in Unknown WP ULike
Description
The WP ULike WordPress plugin before 4.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-12770 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP ULike WordPress plugin versions prior to 4.7.6. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress configurations, which typically restricts HTML content to trusted users. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8 (medium severity), with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires high privileges, and user interaction is needed. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Since the vulnerability requires a high-privilege user to perform the attack and user interaction (such as clicking a crafted link) is necessary, exploitation is somewhat constrained. However, successful exploitation could allow an attacker to execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, or further compromise within the WordPress environment. No known exploits are currently reported in the wild, and no official patch links are provided yet. The vulnerability was reserved in December 2024 and published in May 2025.
Potential Impact
For European organizations using WordPress sites with the WP ULike plugin, this vulnerability poses a moderate risk. Since exploitation requires high privileges, the primary threat vector is insider threats or compromised administrator accounts. If exploited, attackers could inject malicious scripts that affect site administrators or other users, potentially leading to session hijacking, unauthorized actions, or data leakage within the WordPress environment. This could undermine trust in the affected websites, lead to defacement, or facilitate further attacks such as phishing or malware distribution. Multisite WordPress setups, common in larger organizations or managed hosting environments, are particularly at risk because the vulnerability bypasses the usual 'unfiltered_html' restrictions. European organizations with public-facing WordPress sites that use WP ULike for user engagement or content interaction should be vigilant, as exploitation could impact confidentiality and integrity of site content and user data. While availability is not directly affected, reputational damage and compliance risks (e.g., GDPR concerns if personal data is exposed) are relevant considerations.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised high-privilege accounts. 2. Monitor and audit administrator activities and plugin settings changes to detect suspicious behavior that might indicate exploitation attempts. 3. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting the execution of unauthorized scripts. 4. Until an official patch is released, consider disabling or removing the WP ULike plugin if it is not critical to operations, or isolate it in a staging environment for testing. 5. Regularly update WordPress core and all plugins, and subscribe to vulnerability disclosure feeds to apply patches promptly once available. 6. For multisite environments, review and tighten capability assignments and consider additional input validation or sanitization at the application or web server level. 7. Educate administrators about the risks of stored XSS and safe handling of plugin settings to avoid inadvertent injection of malicious content.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-12-18T20:12:49.454Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec1fc
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:27:19 AM
Last updated: 1/7/2026, 4:18:57 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.