CVE-2024-13351: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neran Social proof testimonials and reviews by Repuso
CVE-2024-13351 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Social proof testimonials and reviews by Repuso' affecting all versions up to 5. 20. The flaw arises from improper input sanitization and output escaping in the 'rw_image_badge1' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. Exploitation requires no user interaction beyond visiting the infected page. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and scope pose significant risks to websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent exploitation, especially those relying on contributor-level user roles. The threat primarily affects websites globally but is more critical in countries with high WordPress usage and significant e-commerce or content platforms. The CVSS score of 7. 2 reflects the high impact on integrity and confidentiality with network attack vector and no user interaction required.
AI Analysis
Technical Summary
CVE-2024-13351 is a stored Cross-Site Scripting vulnerability identified in the WordPress plugin 'Social proof testimonials and reviews by Repuso' developed by neran. This vulnerability exists in all plugin versions up to and including 5.20 due to insufficient sanitization and escaping of user-supplied input within the 'rw_image_badge1' shortcode. Specifically, authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code into pages via this shortcode. When other users access these pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deface content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 7.2 (high), with an attack vector of network, low attack complexity, no privileges required beyond contributor access, no user interaction needed, and a scope change indicating the vulnerability affects components beyond the initially vulnerable plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability's exploitation requires authenticated access, which limits exposure to sites allowing contributor-level user roles, but the impact on confidentiality and integrity is significant due to the stored nature of the XSS. This vulnerability highlights the importance of rigorous input validation and output encoding in WordPress plugins, especially those that process user-generated content or shortcodes.
Potential Impact
The primary impact of CVE-2024-13351 is the compromise of confidentiality and integrity on affected WordPress sites. Attackers with contributor-level access can inject persistent malicious scripts that execute in the browsers of any user visiting the infected pages. This can lead to session hijacking, theft of sensitive user data, unauthorized actions performed on behalf of users, and website defacement. The vulnerability does not directly affect availability but can indirectly cause reputational damage and loss of user trust. Organizations relying on this plugin for social proof or testimonials risk exposure to targeted attacks, especially if contributor roles are assigned to untrusted users or if the site has high traffic. The scope of affected systems includes all WordPress sites using the vulnerable plugin version, which can be widespread given WordPress's global popularity. The ease of exploitation combined with the stored nature of the XSS increases the risk of large-scale compromise if exploited. Although no known exploits are currently active, the vulnerability's characteristics make it a prime candidate for future exploitation by attackers aiming to leverage trusted website content for malicious purposes.
Mitigation Recommendations
1. Immediate mitigation involves updating the 'Social proof testimonials and reviews by Repuso' plugin to a patched version once available. Monitor vendor announcements for official fixes. 2. Until a patch is released, restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious shortcode inputs or script tags in user submissions related to the 'rw_image_badge1' shortcode. 4. Conduct regular security audits of user-generated content and shortcodes to identify and remove any injected scripts. 5. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 6. Educate site administrators and contributors on the risks of XSS and the importance of cautious content submission. 7. Consider disabling or removing the vulnerable plugin if it is not essential to site functionality. 8. Monitor logs for unusual activity or signs of exploitation attempts related to this vulnerability. These targeted measures go beyond generic advice by focusing on access control, proactive detection, and layered defenses specific to the plugin's shortcode handling.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, Brazil, France, Netherlands, Japan, South Africa
CVE-2024-13351: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neran Social proof testimonials and reviews by Repuso
Description
CVE-2024-13351 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Social proof testimonials and reviews by Repuso' affecting all versions up to 5. 20. The flaw arises from improper input sanitization and output escaping in the 'rw_image_badge1' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. Exploitation requires no user interaction beyond visiting the infected page. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and scope pose significant risks to websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent exploitation, especially those relying on contributor-level user roles. The threat primarily affects websites globally but is more critical in countries with high WordPress usage and significant e-commerce or content platforms. The CVSS score of 7. 2 reflects the high impact on integrity and confidentiality with network attack vector and no user interaction required.
AI-Powered Analysis
Technical Analysis
CVE-2024-13351 is a stored Cross-Site Scripting vulnerability identified in the WordPress plugin 'Social proof testimonials and reviews by Repuso' developed by neran. This vulnerability exists in all plugin versions up to and including 5.20 due to insufficient sanitization and escaping of user-supplied input within the 'rw_image_badge1' shortcode. Specifically, authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code into pages via this shortcode. When other users access these pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deface content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 7.2 (high), with an attack vector of network, low attack complexity, no privileges required beyond contributor access, no user interaction needed, and a scope change indicating the vulnerability affects components beyond the initially vulnerable plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability's exploitation requires authenticated access, which limits exposure to sites allowing contributor-level user roles, but the impact on confidentiality and integrity is significant due to the stored nature of the XSS. This vulnerability highlights the importance of rigorous input validation and output encoding in WordPress plugins, especially those that process user-generated content or shortcodes.
Potential Impact
The primary impact of CVE-2024-13351 is the compromise of confidentiality and integrity on affected WordPress sites. Attackers with contributor-level access can inject persistent malicious scripts that execute in the browsers of any user visiting the infected pages. This can lead to session hijacking, theft of sensitive user data, unauthorized actions performed on behalf of users, and website defacement. The vulnerability does not directly affect availability but can indirectly cause reputational damage and loss of user trust. Organizations relying on this plugin for social proof or testimonials risk exposure to targeted attacks, especially if contributor roles are assigned to untrusted users or if the site has high traffic. The scope of affected systems includes all WordPress sites using the vulnerable plugin version, which can be widespread given WordPress's global popularity. The ease of exploitation combined with the stored nature of the XSS increases the risk of large-scale compromise if exploited. Although no known exploits are currently active, the vulnerability's characteristics make it a prime candidate for future exploitation by attackers aiming to leverage trusted website content for malicious purposes.
Mitigation Recommendations
1. Immediate mitigation involves updating the 'Social proof testimonials and reviews by Repuso' plugin to a patched version once available. Monitor vendor announcements for official fixes. 2. Until a patch is released, restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block suspicious shortcode inputs or script tags in user submissions related to the 'rw_image_badge1' shortcode. 4. Conduct regular security audits of user-generated content and shortcodes to identify and remove any injected scripts. 5. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 6. Educate site administrators and contributors on the risks of XSS and the importance of cautious content submission. 7. Consider disabling or removing the vulnerable plugin if it is not essential to site functionality. 8. Monitor logs for unusual activity or signs of exploitation attempts related to this vulnerability. These targeted measures go beyond generic advice by focusing on access control, proactive detection, and layered defenses specific to the plugin's shortcode handling.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T15:18:22.307Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e51b7ef31ef0b59e264
Added to database: 2/25/2026, 9:49:05 PM
Last enriched: 2/26/2026, 1:26:26 AM
Last updated: 2/26/2026, 9:46:17 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.