CVE-2024-13460: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wordpresteem WE – Testimonial Slider
CVE-2024-13460 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin WE – Testimonial Slider affecting all versions up to 1. 5. Authenticated users with Contributor-level access or higher can inject malicious scripts via the Testimonial Author Names field. These scripts execute in the context of any user viewing the affected pages, potentially leading to session hijacking or privilege escalation. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction beyond page access. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring authenticated privileges. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent abuse.
AI Analysis
Technical Summary
CVE-2024-13460 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin WE – Testimonial Slider, which is used to display testimonial sliders on websites. The vulnerability exists in all versions up to and including 1.5 due to improper neutralization of input during web page generation (CWE-79). Specifically, the plugin fails to adequately sanitize and escape user-supplied input in the Testimonial Author Names field, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When other users visit pages containing the injected testimonial, the malicious script executes in their browsers, potentially enabling session hijacking, defacement, or further attacks such as privilege escalation or malware delivery. The vulnerability requires authentication but no additional user interaction beyond visiting the compromised page. The CVSS v3.1 score of 6.4 indicates a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to impact on other users. No public exploits have been reported at this time. The vulnerability was published on January 30, 2025, and assigned by Wordfence. Since the plugin is used in WordPress environments, the risk is tied to the prevalence of this plugin and the level of user privileges granted on affected sites.
Potential Impact
The impact of CVE-2024-13460 is significant for organizations running WordPress sites with the WE – Testimonial Slider plugin installed. An attacker with Contributor-level access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential compromise of site integrity. Since the vulnerability affects all versions up to 1.5, any unpatched site is at risk. The scope of impact extends beyond the initial attacker to all users who view the injected testimonial content, increasing the potential damage. Although exploitation requires authenticated access, Contributor-level permissions are commonly granted to trusted users or content creators, which broadens the attack surface. The vulnerability does not affect availability but compromises confidentiality and integrity. Organizations with high traffic or sensitive user data on affected sites face increased risk of data breaches or reputational damage.
Mitigation Recommendations
To mitigate CVE-2024-13460, organizations should immediately update the WE – Testimonial Slider plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level access to trusted users only and review existing testimonials for suspicious content. Implementing Web Application Firewall (WAF) rules to detect and block malicious script patterns in testimonial author fields can reduce risk. Additionally, applying Content Security Policy (CSP) headers can limit the impact of injected scripts by restricting script execution sources. Regularly auditing user roles and permissions to minimize unnecessary privileges reduces the likelihood of exploitation. Site owners should also monitor logs for unusual activity related to testimonial submissions or page views. Finally, educating content contributors about secure input practices and the risks of XSS can help prevent accidental injection of malicious code.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-13460: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wordpresteem WE – Testimonial Slider
Description
CVE-2024-13460 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin WE – Testimonial Slider affecting all versions up to 1. 5. Authenticated users with Contributor-level access or higher can inject malicious scripts via the Testimonial Author Names field. These scripts execute in the context of any user viewing the affected pages, potentially leading to session hijacking or privilege escalation. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction beyond page access. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring authenticated privileges. No known public exploits have been reported yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent abuse.
AI-Powered Analysis
Technical Analysis
CVE-2024-13460 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin WE – Testimonial Slider, which is used to display testimonial sliders on websites. The vulnerability exists in all versions up to and including 1.5 due to improper neutralization of input during web page generation (CWE-79). Specifically, the plugin fails to adequately sanitize and escape user-supplied input in the Testimonial Author Names field, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When other users visit pages containing the injected testimonial, the malicious script executes in their browsers, potentially enabling session hijacking, defacement, or further attacks such as privilege escalation or malware delivery. The vulnerability requires authentication but no additional user interaction beyond visiting the compromised page. The CVSS v3.1 score of 6.4 indicates a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to impact on other users. No public exploits have been reported at this time. The vulnerability was published on January 30, 2025, and assigned by Wordfence. Since the plugin is used in WordPress environments, the risk is tied to the prevalence of this plugin and the level of user privileges granted on affected sites.
Potential Impact
The impact of CVE-2024-13460 is significant for organizations running WordPress sites with the WE – Testimonial Slider plugin installed. An attacker with Contributor-level access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential compromise of site integrity. Since the vulnerability affects all versions up to 1.5, any unpatched site is at risk. The scope of impact extends beyond the initial attacker to all users who view the injected testimonial content, increasing the potential damage. Although exploitation requires authenticated access, Contributor-level permissions are commonly granted to trusted users or content creators, which broadens the attack surface. The vulnerability does not affect availability but compromises confidentiality and integrity. Organizations with high traffic or sensitive user data on affected sites face increased risk of data breaches or reputational damage.
Mitigation Recommendations
To mitigate CVE-2024-13460, organizations should immediately update the WE – Testimonial Slider plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level access to trusted users only and review existing testimonials for suspicious content. Implementing Web Application Firewall (WAF) rules to detect and block malicious script patterns in testimonial author fields can reduce risk. Additionally, applying Content Security Policy (CSP) headers can limit the impact of injected scripts by restricting script execution sources. Regularly auditing user roles and permissions to minimize unnecessary privileges reduces the likelihood of exploitation. Site owners should also monitor logs for unusual activity related to testimonial submissions or page views. Finally, educating content contributors about secure input practices and the risks of XSS can help prevent accidental injection of malicious code.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T15:19:15.748Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e59b7ef31ef0b59eb37
Added to database: 2/25/2026, 9:49:13 PM
Last enriched: 2/26/2026, 12:45:40 AM
Last updated: 2/26/2026, 8:31:11 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.