Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13470: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kstover Ninja Forms – The Contact Form Builder That Grows With You

0
Medium
VulnerabilityCVE-2024-13470cvecve-2024-13470cwe-79
Published: Thu Jan 30 2025 (01/30/2025, 07:23:05 UTC)
Source: CVE Database V5
Vendor/Project: kstover
Product: Ninja Forms – The Contact Form Builder That Grows With You

Description

CVE-2024-13470 is a stored cross-site scripting (XSS) vulnerability in the Ninja Forms WordPress plugin up to version 3. 8. 24. It arises from improper sanitization and escaping of user-supplied shortcode attributes, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially compromising user data and site integrity. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Exploitation requires authentication but no user interaction, and it affects all versions up to 3. 8. 24.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:42:54 UTC

Technical Analysis

CVE-2024-13470 identifies a stored cross-site scripting (XSS) vulnerability in the Ninja Forms WordPress plugin, a widely used contact form builder. The flaw exists due to insufficient input sanitization and output escaping of user-supplied attributes within the plugin's shortcode functionality. Authenticated users with contributor-level permissions or higher can exploit this vulnerability by injecting arbitrary JavaScript code into form shortcodes embedded in pages or posts. When other users, including administrators or site visitors, access these pages, the malicious scripts execute in their browsers. This can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of victims. The vulnerability affects all versions up to and including 3.8.24. The CVSS 3.1 base score of 6.4 reflects a medium severity, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No patches or exploits are currently publicly known, but the vulnerability's presence in a popular plugin makes it a significant risk. The root cause is the failure to properly neutralize input during web page generation, categorized under CWE-79. This vulnerability highlights the importance of rigorous input validation and output encoding in WordPress plugin development to prevent stored XSS attacks that can compromise site security and user trust.

Potential Impact

The impact of CVE-2024-13470 is primarily on the confidentiality and integrity of affected WordPress sites using the Ninja Forms plugin. Successful exploitation allows an authenticated contributor or higher to inject persistent malicious scripts, which execute in the context of other users' browsers. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed with victim privileges, and potential site defacement or redirection to malicious sites. Although availability is not directly affected, the reputational damage and potential data breaches can be severe. Organizations relying on Ninja Forms for contact forms or data collection risk compromise of user data and administrative accounts. The requirement for contributor-level access limits exploitation to insiders or compromised accounts, but this is a common permission level in many WordPress sites, increasing the attack surface. The vulnerability's presence in a widely deployed plugin means a large number of sites globally could be affected, amplifying the potential impact. Without mitigation, attackers could leverage this flaw to establish persistent footholds or escalate privileges within WordPress environments.

Mitigation Recommendations

To mitigate CVE-2024-13470 effectively, organizations should implement the following specific measures: 1) Immediately restrict contributor-level permissions to trusted users only, minimizing the risk of malicious shortcode injection. 2) Monitor and audit existing shortcode content in posts and pages for suspicious or unauthorized scripts, removing any detected malicious code. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns indicative of XSS payloads. 4) Encourage or enforce the use of the latest plugin versions once a patch is released; in the meantime, consider temporarily disabling shortcode usage or the Ninja Forms plugin if feasible. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Educate site administrators and contributors about the risks of injecting untrusted content and the importance of secure coding practices. 7) Regularly back up site data to enable recovery in case of compromise. These targeted actions go beyond generic advice by focusing on permission management, content auditing, and layered defenses specific to the nature of this stored XSS vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T17:18:06.247Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e59b7ef31ef0b59ec1e

Added to database: 2/25/2026, 9:49:13 PM

Last enriched: 2/26/2026, 12:42:54 AM

Last updated: 2/26/2026, 8:30:45 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats