Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13497: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in tripetto WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto

0
High
VulnerabilityCVE-2024-13497cvecve-2024-13497cwe-80
Published: Sat Mar 15 2025 (03/15/2025, 04:22:08 UTC)
Source: CVE Database V5
Vendor/Project: tripetto
Product: WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto

Description

CVE-2024-13497 is a high-severity stored cross-site scripting (XSS) vulnerability in the Tripetto WordPress form builder plugin, affecting all versions up to 8. 0. 9. The flaw arises from insufficient input sanitization and output escaping of attachment uploads, allowing unauthenticated attackers to inject malicious scripts. These scripts execute whenever a user accesses the uploaded file, potentially compromising user data and session integrity. The vulnerability requires no authentication or user interaction to exploit and impacts confidentiality and integrity without affecting availability. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and scope make it a significant risk for websites using this plugin. Organizations relying on Tripetto for contact forms, surveys, or quizzes should prioritize patching or mitigating this issue. Countries with large WordPress user bases and significant online business activities are most at risk. Immediate mitigation includes restricting file upload types, implementing strict input validation, and monitoring for suspicious activity until an official patch is released.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:11:26 UTC

Technical Analysis

CVE-2024-13497 is a stored cross-site scripting vulnerability classified under CWE-80, affecting the Tripetto WordPress form builder plugin used for creating contact forms, surveys, and quizzes. The vulnerability exists due to improper neutralization of script-related HTML tags in attachment uploads, where the plugin fails to sufficiently sanitize and escape user-supplied input before rendering it on web pages. This flaw allows unauthenticated attackers to upload malicious files containing executable scripts that persist on the server and execute in the context of any user accessing the affected pages. The vulnerability affects all versions up to and including 8.0.9. The CVSS 3.1 score of 7.2 reflects a high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, and no user interaction needed. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site environment. Exploitation can lead to the theft of sensitive information such as cookies or session tokens, unauthorized actions performed on behalf of users, and potential further compromise of the website or connected systems. Although no public exploits are currently known, the vulnerability's characteristics make it a prime target for attackers aiming to compromise WordPress sites using Tripetto. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts by administrators.

Potential Impact

The impact of CVE-2024-13497 is significant for organizations using the Tripetto plugin on WordPress sites. Successful exploitation can lead to the compromise of user confidentiality through theft of session cookies or personal data, and integrity by enabling attackers to perform unauthorized actions within the affected site. This can result in account takeover, defacement, or injection of further malicious content, undermining user trust and potentially causing reputational damage. While availability is not directly affected, the broader consequences of a compromised site can include downtime due to remediation efforts or blacklisting by search engines. Organizations in sectors such as e-commerce, education, healthcare, and government, which often rely on web forms for data collection, are particularly vulnerable. The widespread use of WordPress globally means that many organizations could be exposed, especially those that have not updated or mitigated this plugin vulnerability. Attackers can exploit this vulnerability remotely without authentication, increasing the risk of automated mass exploitation campaigns.

Mitigation Recommendations

To mitigate CVE-2024-13497, organizations should immediately audit their WordPress installations for the presence of the Tripetto plugin and verify the version in use. Until an official patch is released, administrators should consider disabling the plugin or restricting file upload functionality to trusted users only. Implement strict server-side validation and sanitization of all uploaded files, ensuring that executable scripts cannot be uploaded or rendered. Employ a web application firewall (WAF) with rules targeting XSS attack patterns, particularly those related to file uploads and script injection. Monitor web server logs and application logs for unusual file upload activity or access patterns indicative of exploitation attempts. Additionally, enforce Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. Regularly back up website data and configurations to enable rapid recovery if compromise occurs. Finally, stay informed about vendor updates and apply official patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T21:09:55.087Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5bb7ef31ef0b59ed7a

Added to database: 2/25/2026, 9:49:15 PM

Last enriched: 2/26/2026, 12:11:26 AM

Last updated: 2/26/2026, 6:39:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats