Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13157: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sonaar MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar

0
Medium
VulnerabilityCVE-2024-13157cvecve-2024-13157cwe-79
Published: Fri Jan 31 2025 (01/31/2025, 08:21:24 UTC)
Source: CVE Database V5
Vendor/Project: sonaar
Product: MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar

Description

CVE-2024-13157 is a stored cross-site scripting (XSS) vulnerability affecting the Sonaar MP3 Audio Player WordPress plugin up to version 5. 9. 3. It arises from improper input sanitization and output escaping in the Podcast RSS Feed feature, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require low privileges to exploit. No known public exploits have been reported yet. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential account takeover or data theft. The threat primarily impacts WordPress sites globally, especially those with active podcast or audio player features using this plugin.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:28:55 UTC

Technical Analysis

CVE-2024-13157 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Sonaar MP3 Audio Player – Music Player, Podcast Player & Radio WordPress plugin. The vulnerability exists due to insufficient sanitization and escaping of user-supplied input in the Podcast RSS Feed functionality. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into podcast feed attributes. This malicious code is stored persistently and executed in the browsers of any users who visit the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability affects all versions up to and including 5.9.3. The CVSS v3.1 base score is 6.4, reflecting network exploitability with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches or official fixes are currently linked, and no known exploits have been observed in the wild. The vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those handling user-generated content or feeds.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of affected WordPress sites. This can lead to theft of authentication cookies, enabling session hijacking and unauthorized access to user accounts. Attackers might also perform actions on behalf of users, inject further malicious content, or redirect users to phishing or malware sites. Since the vulnerability requires contributor-level access, it could be exploited by malicious insiders or compromised accounts. The scope of impact includes all visitors to the infected pages, potentially affecting site administrators, editors, and end-users. Organizations relying on this plugin for podcast or audio content delivery face risks of reputational damage, data breaches, and compliance violations. The medium severity score indicates a significant but not critical threat, yet the persistent nature of stored XSS can facilitate prolonged exploitation if unaddressed.

Mitigation Recommendations

Immediate mitigation steps include restricting contributor-level user permissions to trusted individuals only and monitoring for suspicious activity on affected WordPress sites. Administrators should implement web application firewalls (WAFs) with rules targeting XSS payloads in podcast feed inputs. Until an official patch is released, consider disabling or removing the Sonaar MP3 Audio Player plugin if feasible. Site owners can also sanitize and validate podcast feed inputs manually or via custom code to prevent script injection. Regularly audit user-generated content and feeds for malicious scripts. Employ Content Security Policy (CSP) headers to limit the impact of injected scripts. Finally, maintain up-to-date backups and monitor security advisories from Sonaar and WordPress for forthcoming patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-06T23:30:41.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4db7ef31ef0b59c8be

Added to database: 2/25/2026, 9:49:01 PM

Last enriched: 2/26/2026, 2:28:55 AM

Last updated: 2/26/2026, 9:19:04 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats