Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13390: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in giuliopanda ADFO – Custom data in admin dashboard

0
Medium
VulnerabilityCVE-2024-13390cvecve-2024-13390cwe-79
Published: Wed Feb 19 2025 (02/19/2025, 07:32:07 UTC)
Source: CVE Database V5
Vendor/Project: giuliopanda
Product: ADFO – Custom data in admin dashboard

Description

CVE-2024-13390 is a stored cross-site scripting (XSS) vulnerability in the giuliopanda ADFO – Custom data in admin dashboard WordPress plugin, affecting all versions up to 1. 9. 1. The flaw arises from insufficient input sanitization and output escaping in the plugin's 'adfo_list' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation. The threat primarily affects WordPress sites using this plugin globally, with higher risk in countries with widespread WordPress adoption and active contributor communities. Mitigation involves restricting contributor privileges, implementing strict input validation, and monitoring admin dashboard activities for suspicious behavior.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:31:24 UTC

Technical Analysis

CVE-2024-13390 is a stored cross-site scripting vulnerability identified in the giuliopanda ADFO – Custom data in admin dashboard WordPress plugin, specifically in all versions up to and including 1.9.1. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), where the plugin fails to adequately sanitize and escape user-supplied attributes in the 'adfo_list' shortcode. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages rendered by the plugin. Because the injected scripts are stored persistently, they execute whenever any user accesses the affected page, potentially compromising user sessions, stealing credentials, or performing unauthorized actions within the WordPress environment. The vulnerability does not require user interaction beyond visiting the injected page and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required at the contributor level. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges, impacting other users. No patches or known exploits have been reported yet, but the risk remains significant given the common use of WordPress and the plugin’s administrative context. The vulnerability highlights the importance of strict input validation and output encoding in plugins handling user-generated content, especially in administrative dashboards where elevated privileges exist.

Potential Impact

The impact of CVE-2024-13390 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows an attacker with contributor-level access to inject persistent malicious scripts, which execute in the context of other users, including administrators. This can lead to session hijacking, credential theft, unauthorized administrative actions, and potential site defacement or redirection. While availability is not directly affected, the compromise of administrative accounts or site integrity can cause significant operational disruption. Organizations relying on this plugin risk unauthorized access escalation and data leakage, particularly if administrators or editors access the injected pages. The vulnerability could also facilitate further attacks such as malware distribution or lateral movement within the site’s infrastructure. Given WordPress’s widespread use globally, the threat could affect numerous organizations, especially those with multiple contributors and less stringent access controls. The absence of known exploits currently reduces immediate risk, but the medium severity score and ease of exploitation by authenticated users make timely remediation critical.

Mitigation Recommendations

To mitigate CVE-2024-13390, organizations should first update the ADFO – Custom data in admin dashboard plugin to a patched version once available. In the absence of an official patch, administrators should restrict contributor-level privileges to trusted users only, minimizing the risk of malicious script injection. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script payloads in shortcode attributes can provide interim protection. Additionally, site administrators should audit existing content for injected scripts and remove any suspicious entries. Enforcing strict input validation and output encoding within the plugin’s codebase is essential to prevent future occurrences. Monitoring user activity logs for unusual behavior in the admin dashboard can help detect exploitation attempts early. Employing Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Finally, educating contributors about secure content practices and the risks of injecting untrusted code is recommended to reduce inadvertent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-14T16:37:39.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e54b7ef31ef0b59e4c4

Added to database: 2/25/2026, 9:49:08 PM

Last enriched: 2/26/2026, 1:31:24 AM

Last updated: 2/26/2026, 8:08:18 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats