Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13462: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nida78 WP Wiki Tooltip

0
Medium
VulnerabilityCVE-2024-13462cvecve-2024-13462cwe-79
Published: Wed Feb 19 2025 (02/19/2025, 07:32:11 UTC)
Source: CVE Database V5
Vendor/Project: nida78
Product: WP Wiki Tooltip

Description

CVE-2024-13462 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Wiki Tooltip WordPress plugin up to version 2. 0. 2. It arises from improper sanitization and escaping of user-supplied attributes in the 'wiki' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:45:10 UTC

Technical Analysis

The WP Wiki Tooltip plugin for WordPress, maintained by nida78, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2024-13462. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed to its 'wiki' shortcode, which is used to embed tooltip content within WordPress pages. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. Because the payload is stored, the malicious script executes every time any user accesses the compromised page, potentially affecting all visitors. The vulnerability does not require user interaction beyond visiting the page and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and only low privileges are needed (PR:L). The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No patches or known exploits are currently available, but the risk remains significant due to the widespread use of WordPress and the plugin's functionality. The vulnerability was published on February 19, 2025, and was reserved on January 16, 2025.

Potential Impact

This vulnerability allows attackers with contributor-level access to inject persistent malicious scripts into WordPress pages, which execute in the context of any user visiting those pages. Potential impacts include theft of session cookies or authentication tokens, enabling account takeover; defacement or manipulation of website content; redirection to malicious sites; and execution of arbitrary actions on behalf of users with elevated privileges. Since WordPress powers a large portion of the web, and WP Wiki Tooltip is used to enhance content with tooltips, many organizations could be exposed. The compromise of user accounts or administrative sessions could lead to broader site control or data breaches. The vulnerability’s ability to affect all visitors to an infected page increases its risk profile, especially for sites with high traffic or sensitive user data. Although exploitation requires contributor-level access, such access is common in collaborative environments, increasing the likelihood of insider threats or compromised accounts being leveraged. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public.

Mitigation Recommendations

Organizations should immediately review their use of the WP Wiki Tooltip plugin and upgrade to a patched version once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'wiki' shortcode parameters can provide interim protection. Regularly audit user-generated content for injected scripts and monitor logs for unusual activity. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. Additionally, enforce strong authentication and account monitoring to detect compromised contributor accounts. Educate content contributors about the risks of injecting untrusted code and encourage reporting of suspicious behavior. Finally, maintain up-to-date backups to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T15:23:16.603Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e59b7ef31ef0b59eb3f

Added to database: 2/25/2026, 9:49:13 PM

Last enriched: 2/26/2026, 12:45:10 AM

Last updated: 2/26/2026, 8:42:00 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats