CVE-2024-13391: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet
CVE-2024-13391 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet by videowhisper. The flaw exists in the 'videowhisper_content_upload_guest' shortcode due to insufficient input sanitization and output escaping of user-supplied attributes. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when other users view the affected pages. This vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. While no known exploits are reported in the wild, the vulnerability could lead to partial confidentiality and integrity impacts, such as session hijacking or unauthorized actions within the site. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress and this plugin have significant adoption, including the United States, United Kingdom, Germany, Canada, Australia, and others.
AI Analysis
Technical Summary
CVE-2024-13391 is a stored cross-site scripting (XSS) vulnerability identified in the MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet WordPress plugin developed by videowhisper. The vulnerability arises from improper neutralization of input during web page generation, specifically within the 'videowhisper_content_upload_guest' shortcode. This shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress site. The vulnerability affects all versions up to and including 2.9.29. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites using this plugin, especially those with multiple contributors and high user traffic. The scope is limited to sites running this plugin, but the impact can be severe if exploited, as it can compromise user sessions and site integrity.
Potential Impact
The primary impact of CVE-2024-13391 is the potential for attackers with contributor-level access to inject malicious scripts that execute in the context of other users visiting the compromised pages. This can lead to theft of session cookies, enabling account takeover, unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. Confidentiality is partially compromised as sensitive user data accessible via the browser can be exposed. Integrity is also affected since attackers can manipulate page content or perform actions with victim user privileges. Availability is not impacted directly. Organizations running this plugin on WordPress sites face risks of reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. The risk is heightened in environments with multiple contributors and high user engagement, such as content platforms or subscription-based services. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and the widespread use of WordPress make it a credible threat.
Mitigation Recommendations
To mitigate CVE-2024-13391, organizations should immediately update the MicroPayments – Fans Paysite plugin to a patched version once available. Until a patch is released, administrators should restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the 'videowhisper_content_upload_guest' shortcode can provide interim protection. Site owners should audit existing content for suspicious scripts or injected code and remove any found. Enforcing Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Regular security scanning and monitoring for anomalous user behavior or content changes are recommended. Additionally, educating contributors about secure input handling and monitoring plugin updates from the vendor is critical. Backup procedures should be verified to enable quick restoration if exploitation occurs.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13391: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet
Description
CVE-2024-13391 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet by videowhisper. The flaw exists in the 'videowhisper_content_upload_guest' shortcode due to insufficient input sanitization and output escaping of user-supplied attributes. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when other users view the affected pages. This vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. While no known exploits are reported in the wild, the vulnerability could lead to partial confidentiality and integrity impacts, such as session hijacking or unauthorized actions within the site. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites using this specific plugin, with higher risk in countries where WordPress and this plugin have significant adoption, including the United States, United Kingdom, Germany, Canada, Australia, and others.
AI-Powered Analysis
Technical Analysis
CVE-2024-13391 is a stored cross-site scripting (XSS) vulnerability identified in the MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Tokens Wallet WordPress plugin developed by videowhisper. The vulnerability arises from improper neutralization of input during web page generation, specifically within the 'videowhisper_content_upload_guest' shortcode. This shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress site. The vulnerability affects all versions up to and including 2.9.29. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to sites using this plugin, especially those with multiple contributors and high user traffic. The scope is limited to sites running this plugin, but the impact can be severe if exploited, as it can compromise user sessions and site integrity.
Potential Impact
The primary impact of CVE-2024-13391 is the potential for attackers with contributor-level access to inject malicious scripts that execute in the context of other users visiting the compromised pages. This can lead to theft of session cookies, enabling account takeover, unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. Confidentiality is partially compromised as sensitive user data accessible via the browser can be exposed. Integrity is also affected since attackers can manipulate page content or perform actions with victim user privileges. Availability is not impacted directly. Organizations running this plugin on WordPress sites face risks of reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. The risk is heightened in environments with multiple contributors and high user engagement, such as content platforms or subscription-based services. Although no known exploits are currently active in the wild, the vulnerability's ease of exploitation and the widespread use of WordPress make it a credible threat.
Mitigation Recommendations
To mitigate CVE-2024-13391, organizations should immediately update the MicroPayments – Fans Paysite plugin to a patched version once available. Until a patch is released, administrators should restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the 'videowhisper_content_upload_guest' shortcode can provide interim protection. Site owners should audit existing content for suspicious scripts or injected code and remove any found. Enforcing Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Regular security scanning and monitoring for anomalous user behavior or content changes are recommended. Additionally, educating contributors about secure input handling and monitoring plugin updates from the vendor is critical. Backup procedures should be verified to enable quick restoration if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-14T16:39:17.967Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e54b7ef31ef0b59e4ca
Added to database: 2/25/2026, 9:49:08 PM
Last enriched: 2/26/2026, 1:31:08 AM
Last updated: 2/26/2026, 8:31:32 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.