CVE-2024-13462: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nida78 WP Wiki Tooltip
CVE-2024-13462 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Wiki Tooltip WordPress plugin up to version 2. 0. 2. It arises from improper sanitization and escaping of user-supplied attributes in the 'wiki' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI Analysis
Technical Summary
The WP Wiki Tooltip plugin for WordPress, maintained by nida78, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2024-13462. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed to its 'wiki' shortcode, which is used to embed tooltip content within WordPress pages. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. Because the payload is stored, the malicious script executes every time any user accesses the compromised page, potentially affecting all visitors. The vulnerability does not require user interaction beyond visiting the page and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and only low privileges are needed (PR:L). The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No patches or known exploits are currently available, but the risk remains significant due to the widespread use of WordPress and the plugin's functionality. The vulnerability was published on February 19, 2025, and was reserved on January 16, 2025.
Potential Impact
This vulnerability allows attackers with contributor-level access to inject persistent malicious scripts into WordPress pages, which execute in the context of any user visiting those pages. Potential impacts include theft of session cookies or authentication tokens, enabling account takeover; defacement or manipulation of website content; redirection to malicious sites; and execution of arbitrary actions on behalf of users with elevated privileges. Since WordPress powers a large portion of the web, and WP Wiki Tooltip is used to enhance content with tooltips, many organizations could be exposed. The compromise of user accounts or administrative sessions could lead to broader site control or data breaches. The vulnerability’s ability to affect all visitors to an infected page increases its risk profile, especially for sites with high traffic or sensitive user data. Although exploitation requires contributor-level access, such access is common in collaborative environments, increasing the likelihood of insider threats or compromised accounts being leveraged. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public.
Mitigation Recommendations
Organizations should immediately review their use of the WP Wiki Tooltip plugin and upgrade to a patched version once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'wiki' shortcode parameters can provide interim protection. Regularly audit user-generated content for injected scripts and monitor logs for unusual activity. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. Additionally, enforce strong authentication and account monitoring to detect compromised contributor accounts. Educate content contributors about the risks of injecting untrusted code and encourage reporting of suspicious behavior. Finally, maintain up-to-date backups to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13462: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nida78 WP Wiki Tooltip
Description
CVE-2024-13462 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Wiki Tooltip WordPress plugin up to version 2. 0. 2. It arises from improper sanitization and escaping of user-supplied attributes in the 'wiki' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI-Powered Analysis
Technical Analysis
The WP Wiki Tooltip plugin for WordPress, maintained by nida78, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2024-13462. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed to its 'wiki' shortcode, which is used to embed tooltip content within WordPress pages. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. Because the payload is stored, the malicious script executes every time any user accesses the compromised page, potentially affecting all visitors. The vulnerability does not require user interaction beyond visiting the page and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and only low privileges are needed (PR:L). The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No patches or known exploits are currently available, but the risk remains significant due to the widespread use of WordPress and the plugin's functionality. The vulnerability was published on February 19, 2025, and was reserved on January 16, 2025.
Potential Impact
This vulnerability allows attackers with contributor-level access to inject persistent malicious scripts into WordPress pages, which execute in the context of any user visiting those pages. Potential impacts include theft of session cookies or authentication tokens, enabling account takeover; defacement or manipulation of website content; redirection to malicious sites; and execution of arbitrary actions on behalf of users with elevated privileges. Since WordPress powers a large portion of the web, and WP Wiki Tooltip is used to enhance content with tooltips, many organizations could be exposed. The compromise of user accounts or administrative sessions could lead to broader site control or data breaches. The vulnerability’s ability to affect all visitors to an infected page increases its risk profile, especially for sites with high traffic or sensitive user data. Although exploitation requires contributor-level access, such access is common in collaborative environments, increasing the likelihood of insider threats or compromised accounts being leveraged. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public.
Mitigation Recommendations
Organizations should immediately review their use of the WP Wiki Tooltip plugin and upgrade to a patched version once available. Until a patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'wiki' shortcode parameters can provide interim protection. Regularly audit user-generated content for injected scripts and monitor logs for unusual activity. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. Additionally, enforce strong authentication and account monitoring to detect compromised contributor accounts. Educate content contributors about the risks of injecting untrusted code and encourage reporting of suspicious behavior. Finally, maintain up-to-date backups to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T15:23:16.603Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e59b7ef31ef0b59eb3f
Added to database: 2/25/2026, 9:49:13 PM
Last enriched: 2/26/2026, 12:45:10 AM
Last updated: 2/26/2026, 8:42:00 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.