CVE-2024-13406: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icopydoc XML for Google Merchant Center
CVE-2024-13406 is a reflected Cross-Site Scripting (XSS) vulnerability in the XML for Google Merchant Center WordPress plugin by icopydoc, affecting all versions up to 3. 0. 11. The flaw arises from insufficient input sanitization and output escaping of the 'feed_id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity) and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent potential phishing, session hijacking, or other script-based attacks. Countries with significant WordPress usage and e-commerce reliance are at higher risk.
AI Analysis
Technical Summary
CVE-2024-13406 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the XML for Google Merchant Center plugin for WordPress, developed by icopydoc. This vulnerability exists in all versions up to and including 3.0.11 due to improper neutralization of user-supplied input in the 'feed_id' parameter. Specifically, the plugin fails to adequately sanitize and escape this parameter before including it in web page output, enabling attackers to inject arbitrary JavaScript code. Because the vulnerability is reflected, the malicious payload is delivered via a crafted URL that, when clicked by a user, causes the injected script to execute in the context of the victim's browser. The attack does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component, potentially impacting user sessions or data. No public exploits have been reported yet, but the vulnerability poses risks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The plugin is widely used by WordPress sites integrating Google Merchant Center feeds, making this a relevant threat to e-commerce and marketing websites. The vulnerability was published on January 22, 2025, and assigned by Wordfence.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of users interacting with affected WordPress sites using the vulnerable plugin. Attackers can inject malicious scripts that execute in the context of the victim’s browser, potentially stealing session cookies, credentials, or other sensitive information. This can lead to account takeover, unauthorized transactions, or phishing attacks. While availability is not directly affected, the reputational damage and loss of customer trust can be significant for e-commerce and marketing websites relying on Google Merchant Center feeds. The vulnerability’s ease of exploitation (no authentication required) combined with the need for user interaction means attackers can craft targeted phishing campaigns to maximize impact. Organizations worldwide using this plugin are at risk, especially those with high traffic and customer engagement. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future.
Mitigation Recommendations
1. Update the XML for Google Merchant Center plugin to a version beyond 3.0.11 once a patched release is available. Monitor the vendor’s announcements for official patches. 2. In the absence of an immediate patch, implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing script payloads in the 'feed_id' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Educate users and administrators about the risks of clicking unknown or suspicious links, especially those related to the affected sites. 5. Regularly audit and sanitize all user inputs and outputs in custom code or plugins to prevent similar vulnerabilities. 6. Monitor logs for unusual activity or repeated attempts to exploit the 'feed_id' parameter. 7. Consider disabling or restricting the plugin’s functionality if it is not critical to business operations until a patch is applied. 8. Use security plugins that provide XSS protection and input validation enhancements for WordPress environments.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13406: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icopydoc XML for Google Merchant Center
Description
CVE-2024-13406 is a reflected Cross-Site Scripting (XSS) vulnerability in the XML for Google Merchant Center WordPress plugin by icopydoc, affecting all versions up to 3. 0. 11. The flaw arises from insufficient input sanitization and output escaping of the 'feed_id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity) and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent potential phishing, session hijacking, or other script-based attacks. Countries with significant WordPress usage and e-commerce reliance are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13406 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the XML for Google Merchant Center plugin for WordPress, developed by icopydoc. This vulnerability exists in all versions up to and including 3.0.11 due to improper neutralization of user-supplied input in the 'feed_id' parameter. Specifically, the plugin fails to adequately sanitize and escape this parameter before including it in web page output, enabling attackers to inject arbitrary JavaScript code. Because the vulnerability is reflected, the malicious payload is delivered via a crafted URL that, when clicked by a user, causes the injected script to execute in the context of the victim's browser. The attack does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity but not availability. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component, potentially impacting user sessions or data. No public exploits have been reported yet, but the vulnerability poses risks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The plugin is widely used by WordPress sites integrating Google Merchant Center feeds, making this a relevant threat to e-commerce and marketing websites. The vulnerability was published on January 22, 2025, and assigned by Wordfence.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of users interacting with affected WordPress sites using the vulnerable plugin. Attackers can inject malicious scripts that execute in the context of the victim’s browser, potentially stealing session cookies, credentials, or other sensitive information. This can lead to account takeover, unauthorized transactions, or phishing attacks. While availability is not directly affected, the reputational damage and loss of customer trust can be significant for e-commerce and marketing websites relying on Google Merchant Center feeds. The vulnerability’s ease of exploitation (no authentication required) combined with the need for user interaction means attackers can craft targeted phishing campaigns to maximize impact. Organizations worldwide using this plugin are at risk, especially those with high traffic and customer engagement. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future.
Mitigation Recommendations
1. Update the XML for Google Merchant Center plugin to a version beyond 3.0.11 once a patched release is available. Monitor the vendor’s announcements for official patches. 2. In the absence of an immediate patch, implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing script payloads in the 'feed_id' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Educate users and administrators about the risks of clicking unknown or suspicious links, especially those related to the affected sites. 5. Regularly audit and sanitize all user inputs and outputs in custom code or plugins to prevent similar vulnerabilities. 6. Monitor logs for unusual activity or repeated attempts to exploit the 'feed_id' parameter. 7. Consider disabling or restricting the plugin’s functionality if it is not critical to business operations until a patch is applied. 8. Use security plugins that provide XSS protection and input validation enhancements for WordPress environments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-15T16:48:24.699Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e54b7ef31ef0b59e5c1
Added to database: 2/25/2026, 9:49:08 PM
Last enriched: 2/26/2026, 1:16:42 AM
Last updated: 2/26/2026, 9:05:08 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
UnknownCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
UnknownCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
UnknownCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
UnknownCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.