CVE-2024-13392: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings
CVE-2024-13392 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings' by videowhisper, affecting all versions up to 1. 6. 3. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'videowhisper_reviews' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction beyond page access. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects websites globally where this plugin is installed, with higher risk in countries with widespread WordPress usage.
AI Analysis
Technical Summary
CVE-2024-13392 is a stored cross-site scripting vulnerability identified in the 'Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings' WordPress plugin developed by videowhisper. The flaw exists in all versions up to and including 1.6.3 and stems from insufficient sanitization and escaping of user-supplied input passed through the 'videowhisper_reviews' shortcode. Authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who views the affected page. This vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. Potential impacts include session hijacking, theft of sensitive information, unauthorized actions on behalf of users, and site defacement. No public exploits have been reported yet, but the vulnerability is publicly disclosed and documented. The plugin is used in WordPress environments, which are widely deployed globally, making the threat relevant to many organizations running WordPress sites with this plugin installed. The vulnerability highlights the need for proper input validation and output encoding in web applications, especially for plugins that accept user-generated content. Since no patch links are currently available, mitigation relies on access control, monitoring, and web application firewall rules until an official update is released.
Potential Impact
The impact of CVE-2024-13392 is significant for organizations running WordPress sites with the vulnerable plugin installed. Successful exploitation allows authenticated contributors or higher to inject persistent malicious scripts that execute in the browsers of any visitors to the compromised pages. This can lead to session hijacking, enabling attackers to impersonate legitimate users, including administrators, potentially resulting in full site takeover. It can also facilitate theft of sensitive user data, unauthorized actions such as content manipulation or privilege escalation, and damage to organizational reputation through defacement or distribution of malware. The vulnerability affects confidentiality and integrity but not availability directly. Because the attack requires contributor-level access, the risk is somewhat mitigated by proper user role management; however, many WordPress sites allow contributors or similar roles, increasing exposure. The widespread use of WordPress globally means a large attack surface, and targeted attacks against high-value sites using this plugin could have serious consequences. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Monitor for and apply any official patches or updates released by videowhisper for the Rate Star Review Vote plugin as soon as they become available. 2. Restrict contributor-level and higher privileges strictly to trusted users to reduce the risk of malicious script injection. 3. Implement a web application firewall (WAF) with rules designed to detect and block typical XSS payloads, especially those targeting the 'videowhisper_reviews' shortcode parameters. 4. Conduct regular security audits of user-generated content and shortcode usage to identify suspicious or anomalous inputs. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 6. Consider temporarily disabling or removing the vulnerable plugin if patching is not immediately possible, especially on high-risk or public-facing sites. 7. Educate site administrators and contributors about the risks of XSS and safe content submission practices. 8. Use security plugins that sanitize and validate inputs on WordPress sites to provide an additional layer of defense. These measures collectively reduce the likelihood and impact of exploitation until a secure plugin version is deployed.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-13392: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings
Description
CVE-2024-13392 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings' by videowhisper, affecting all versions up to 1. 6. 3. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'videowhisper_reviews' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction beyond page access. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects websites globally where this plugin is installed, with higher risk in countries with widespread WordPress usage.
AI-Powered Analysis
Technical Analysis
CVE-2024-13392 is a stored cross-site scripting vulnerability identified in the 'Rate Star Review Vote – AJAX Reviews, Votes, Star Ratings' WordPress plugin developed by videowhisper. The flaw exists in all versions up to and including 1.6.3 and stems from insufficient sanitization and escaping of user-supplied input passed through the 'videowhisper_reviews' shortcode. Authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who views the affected page. This vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. Potential impacts include session hijacking, theft of sensitive information, unauthorized actions on behalf of users, and site defacement. No public exploits have been reported yet, but the vulnerability is publicly disclosed and documented. The plugin is used in WordPress environments, which are widely deployed globally, making the threat relevant to many organizations running WordPress sites with this plugin installed. The vulnerability highlights the need for proper input validation and output encoding in web applications, especially for plugins that accept user-generated content. Since no patch links are currently available, mitigation relies on access control, monitoring, and web application firewall rules until an official update is released.
Potential Impact
The impact of CVE-2024-13392 is significant for organizations running WordPress sites with the vulnerable plugin installed. Successful exploitation allows authenticated contributors or higher to inject persistent malicious scripts that execute in the browsers of any visitors to the compromised pages. This can lead to session hijacking, enabling attackers to impersonate legitimate users, including administrators, potentially resulting in full site takeover. It can also facilitate theft of sensitive user data, unauthorized actions such as content manipulation or privilege escalation, and damage to organizational reputation through defacement or distribution of malware. The vulnerability affects confidentiality and integrity but not availability directly. Because the attack requires contributor-level access, the risk is somewhat mitigated by proper user role management; however, many WordPress sites allow contributors or similar roles, increasing exposure. The widespread use of WordPress globally means a large attack surface, and targeted attacks against high-value sites using this plugin could have serious consequences. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
1. Monitor for and apply any official patches or updates released by videowhisper for the Rate Star Review Vote plugin as soon as they become available. 2. Restrict contributor-level and higher privileges strictly to trusted users to reduce the risk of malicious script injection. 3. Implement a web application firewall (WAF) with rules designed to detect and block typical XSS payloads, especially those targeting the 'videowhisper_reviews' shortcode parameters. 4. Conduct regular security audits of user-generated content and shortcode usage to identify suspicious or anomalous inputs. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 6. Consider temporarily disabling or removing the vulnerable plugin if patching is not immediately possible, especially on high-risk or public-facing sites. 7. Educate site administrators and contributors about the risks of XSS and safe content submission practices. 8. Use security plugins that sanitize and validate inputs on WordPress sites to provide an additional layer of defense. These measures collectively reduce the likelihood and impact of exploitation until a secure plugin version is deployed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-14T16:42:47.908Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e54b7ef31ef0b59e4cf
Added to database: 2/25/2026, 9:49:08 PM
Last enriched: 2/26/2026, 1:30:52 AM
Last updated: 2/26/2026, 8:29:59 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.