Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13501: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veerwest WP-FormAssembly

0
Medium
VulnerabilityCVE-2024-13501cvecve-2024-13501cwe-79
Published: Tue Feb 18 2025 (02/18/2025, 04:21:12 UTC)
Source: CVE Database V5
Vendor/Project: veerwest
Product: WP-FormAssembly

Description

CVE-2024-13501 is a stored Cross-Site Scripting (XSS) vulnerability in the WP-FormAssembly WordPress plugin up to version 2. 0. 11. It allows authenticated users with contributor-level or higher privileges to inject malicious scripts via the 'formassembly' shortcode due to improper input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Exploitation requires authentication but no user interaction beyond viewing the infected page. Organizations using this plugin should prioritize patching or mitigating this issue to prevent abuse. The threat mainly affects WordPress sites using WP-FormAssembly, which are common worldwide but especially prevalent in countries with large WordPress user bases.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:30:30 UTC

Technical Analysis

CVE-2024-13501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP-FormAssembly plugin for WordPress, affecting all versions up to and including 2.0.11. The root cause is insufficient sanitization and output escaping of user-supplied attributes within the plugin's 'formassembly' shortcode. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes every time a user accesses the compromised page, potentially affecting administrators, editors, and visitors. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.4, reflecting a medium severity level, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and a scope change due to affecting other users. No patches or known exploits have been reported yet, but the vulnerability poses a significant risk to the confidentiality and integrity of affected sites. This vulnerability can be leveraged for session hijacking, defacement, or further privilege escalation within the WordPress environment.

Potential Impact

The impact of CVE-2024-13501 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows an attacker with contributor-level access to inject persistent malicious scripts that execute in the context of other users, including administrators. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of other users, and potential site defacement. Although availability is not directly impacted, the compromise of administrative accounts or site integrity can lead to downtime or loss of user trust. Organizations relying on WP-FormAssembly for form management face risks of data leakage and unauthorized control over site content. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with many contributors or where account compromise is possible. The vulnerability could be leveraged as a foothold for broader attacks within the WordPress ecosystem or the hosting environment.

Mitigation Recommendations

To mitigate CVE-2024-13501, organizations should first upgrade the WP-FormAssembly plugin to a fixed version once released by the vendor. Until a patch is available, restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'formassembly' shortcode. Conduct regular audits of user-generated content and shortcode usage to identify and remove injected scripts. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Additionally, monitor logs for unusual activity related to form submissions or shortcode usage. Educate administrators and contributors about the risks of XSS and safe content handling. Finally, consider isolating or disabling the plugin if it is not essential, reducing the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T01:53:38.333Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5cb7ef31ef0b59ee90

Added to database: 2/25/2026, 9:49:16 PM

Last enriched: 2/26/2026, 12:30:30 AM

Last updated: 2/26/2026, 7:21:26 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats