Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13515: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webzunft Image Source Control Lite – Show Image Credits and Captions

0
Medium
VulnerabilityCVE-2024-13515cvecve-2024-13515cwe-79
Published: Sat Jan 18 2025 (01/18/2025, 05:33:49 UTC)
Source: CVE Database V5
Vendor/Project: webzunft
Product: Image Source Control Lite – Show Image Credits and Captions

Description

CVE-2024-13515 is a reflected Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Image Source Control Lite – Show Image Credits and Captions' by webzunft, affecting all versions up to 2. 28. 0. The flaw arises from improper sanitization and escaping of the 'path' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking users into clicking crafted links, leading to script execution in their browsers. This vulnerability can compromise user confidentiality and integrity but does not affect availability. The CVSS score is 6. 1 (medium severity), reflecting ease of exploitation without authentication but requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential targeted attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:28:20 UTC

Technical Analysis

CVE-2024-13515 identifies a reflected Cross-Site Scripting vulnerability in the 'Image Source Control Lite – Show Image Credits and Captions' WordPress plugin developed by webzunft. This vulnerability exists in all versions up to and including 2.28.0 due to insufficient input sanitization and output escaping of the 'path' parameter. When an attacker crafts a malicious URL containing a script payload in the 'path' parameter and convinces a user to click it, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising user confidentiality and integrity. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, indicating medium severity, with attack vector network, low attack complexity, no privileges required, user interaction required, and scope changed. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments for managing image credits and captions, making the attack surface significant in websites relying on this plugin. The reflected nature of the XSS means it can be used in phishing campaigns or targeted attacks to compromise site visitors.

Potential Impact

The primary impact of CVE-2024-13515 is on the confidentiality and integrity of users interacting with vulnerable WordPress sites using the affected plugin. Successful exploitation can lead to session hijacking, theft of sensitive information, or execution of arbitrary scripts in the victim's browser, potentially enabling further attacks such as phishing or malware delivery. While availability is not directly impacted, the reputation and trustworthiness of affected websites can suffer, leading to loss of user confidence and potential business impact. Organizations hosting WordPress sites with this plugin may face increased risk of targeted attacks, especially if their user base is large or includes privileged users. The vulnerability's ease of exploitation without authentication but requiring user interaction makes it a moderate risk, particularly in environments where users are less security-aware. The lack of known exploits in the wild currently limits immediate widespread impact but does not preclude future exploitation. Overall, the threat is significant for website operators and their users, especially in sectors relying heavily on WordPress for content management.

Mitigation Recommendations

To mitigate CVE-2024-13515, organizations should immediately update the 'Image Source Control Lite – Show Image Credits and Captions' plugin to a patched version once available from the vendor. Until a patch is released, administrators can implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious script payloads in the 'path' parameter. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Site owners should audit and sanitize all user-controllable inputs rigorously, especially URL parameters, to prevent injection. Educating users to avoid clicking suspicious links can reduce exploitation likelihood. Additionally, monitoring web server logs for unusual query parameters and anomalous traffic patterns can help detect attempted exploitation. Regular security assessments and plugin inventory reviews should be conducted to identify and remediate vulnerable components promptly. Disabling or removing unused plugins reduces the attack surface. Finally, implementing multi-factor authentication (MFA) for user accounts can limit damage if session tokens are compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T17:06:43.842Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5cb7ef31ef0b59ef1e

Added to database: 2/25/2026, 9:49:16 PM

Last enriched: 2/26/2026, 12:28:20 AM

Last updated: 2/26/2026, 6:11:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats