Skip to main content

CVE-2024-13383: CWE-79 Cross-Site Scripting (XSS) in Unknown HD Quiz

Medium
VulnerabilityCVE-2024-13383cvecve-2024-13383cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:01 UTC)
Source: CVE
Vendor/Project: Unknown
Product: HD Quiz

Description

The HD Quiz WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:42:28 UTC

Technical Analysis

CVE-2024-13383 is a medium-severity vulnerability affecting the HD Quiz WordPress plugin versions prior to 2.0.0. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw classified under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), and requiring user interaction (UI:R). The impact scope is changed (S:C), with low confidentiality and integrity impacts and no availability impact. Exploitation requires an authenticated user with high privileges to inject the malicious payload, which then executes in the context of other users viewing the affected settings or pages. This can lead to session hijacking, privilege escalation, or other malicious actions depending on the payload. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the need for vigilance and prompt updates once available.

Potential Impact

For European organizations using WordPress sites with the HD Quiz plugin, this vulnerability poses a risk primarily to administrative users and site integrity. If exploited, attackers could execute arbitrary JavaScript in the context of the site, potentially stealing session cookies, performing actions on behalf of other users, or injecting further malicious content. This could lead to unauthorized access, data leakage, or defacement. Given that the vulnerability requires high privileges to exploit, the risk is somewhat mitigated by proper access controls. However, in environments with multiple administrators or where privilege management is lax, the threat is significant. Multisite WordPress installations, common in larger organizations and educational institutions across Europe, are particularly at risk because the vulnerability bypasses the unfiltered_html restriction. The impact on confidentiality and integrity is low to medium, but the potential for lateral movement or further exploitation exists if combined with other vulnerabilities or social engineering. Availability is not directly affected. The reputational damage and compliance implications (e.g., GDPR) from a successful attack could be substantial for European entities.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the HD Quiz plugin and verify the version in use. 2. Restrict administrative privileges strictly to trusted personnel and enforce the principle of least privilege to reduce the risk of malicious or accidental exploitation. 3. Monitor and review plugin settings and content for suspicious or unexpected script injections. 4. Implement Content Security Policy (CSP) headers to limit the impact of XSS by restricting the execution of unauthorized scripts. 5. Disable or limit the use of the HD Quiz plugin until a patched version is released. 6. Keep WordPress core, themes, and all plugins up to date, and apply security patches promptly once available for HD Quiz. 7. Conduct regular security training for administrators to recognize and prevent injection of malicious content. 8. Use web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting plugin settings. 9. In multisite environments, review and tighten unfiltered_html capabilities and consider additional monitoring for high privilege user actions. 10. Backup site data regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-14T14:10:58.775Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec21f

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:42:28 AM

Last updated: 8/11/2025, 7:29:39 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats