Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tcoder TCBD Tooltip

0
Medium
VulnerabilityCVE-2024-13388cvecve-2024-13388cwe-79
Published: Fri Feb 21 2025 (02/21/2025, 03:21:19 UTC)
Source: CVE Database V5
Vendor/Project: tcoder
Product: TCBD Tooltip

Description

CVE-2024-13388 is a stored cross-site scripting (XSS) vulnerability in the TCBD Tooltip WordPress plugin, affecting all versions up to 1. 0. The flaw arises from improper sanitization and escaping of user-supplied input in the 'tcbdtooltip_text' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Mitigation requires applying patches or implementing strict input validation and output encoding. Organizations using this plugin should audit user roles and restrict contributor access where possible to reduce risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:31:42 UTC

Technical Analysis

CVE-2024-13388 identifies a stored cross-site scripting vulnerability in the TCBD Tooltip plugin for WordPress, specifically in the 'tcbdtooltip_text' shortcode. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes, allowing an authenticated attacker with contributor-level or higher privileges to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions within the context of the victim’s session. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network exploitability with low attack complexity, requiring privileges but no user interaction, and a scope change due to the cross-site scripting impact extending beyond the initial component. No patches or official fixes are currently listed, and no active exploitation has been reported. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. This flaw is particularly dangerous in multi-user WordPress environments where contributors can add content but are not fully trusted. The lack of output escaping means that malicious scripts can persist in the database and affect all visitors to the infected pages.

Potential Impact

The impact of CVE-2024-13388 is primarily on confidentiality and integrity, with no direct availability impact. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of other users’ browsers, potentially leading to session hijacking, theft of sensitive information, unauthorized actions on behalf of users, or defacement of website content. Since the vulnerability requires contributor-level access, it is less likely to be exploited by external unauthenticated attackers but poses a significant risk from insider threats or compromised contributor accounts. Organizations running WordPress sites with this plugin may face reputational damage, data leakage, and unauthorized privilege escalation. The scope of affected systems is limited to sites using the TCBD Tooltip plugin, but given WordPress’s widespread use, the potential reach is global. The vulnerability could be leveraged as part of a larger attack chain, especially in environments where contributors have broad content publishing capabilities.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for updates or patches from the plugin vendor and apply them promptly once available. In the absence of official patches, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the TCBD Tooltip plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block common XSS payloads can provide additional protection. Site administrators should audit existing content for injected scripts and remove any suspicious shortcode usage. Employing strict input validation and output encoding in custom plugin code or overrides can reduce risk. Regular security training for contributors to recognize phishing and social engineering attempts can help prevent account compromise. Monitoring logs for unusual activity related to shortcode usage or content changes is also recommended. Finally, consider using security plugins that scan for XSS vulnerabilities and malicious code injections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-14T16:31:50.163Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e54b7ef31ef0b59e4bf

Added to database: 2/25/2026, 9:49:08 PM

Last enriched: 2/26/2026, 1:31:42 AM

Last updated: 2/26/2026, 8:36:51 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats