CVE-2024-13515: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webzunft Image Source Control Lite – Show Image Credits and Captions
CVE-2024-13515 is a reflected Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Image Source Control Lite – Show Image Credits and Captions' by webzunft, affecting all versions up to 2. 28. 0. The flaw arises from improper sanitization and escaping of the 'path' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking users into clicking crafted links, leading to script execution in their browsers. This vulnerability can compromise user confidentiality and integrity but does not affect availability. The CVSS score is 6. 1 (medium severity), reflecting ease of exploitation without authentication but requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential targeted attacks.
AI Analysis
Technical Summary
CVE-2024-13515 identifies a reflected Cross-Site Scripting vulnerability in the 'Image Source Control Lite – Show Image Credits and Captions' WordPress plugin developed by webzunft. This vulnerability exists in all versions up to and including 2.28.0 due to insufficient input sanitization and output escaping of the 'path' parameter. When an attacker crafts a malicious URL containing a script payload in the 'path' parameter and convinces a user to click it, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising user confidentiality and integrity. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, indicating medium severity, with attack vector network, low attack complexity, no privileges required, user interaction required, and scope changed. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments for managing image credits and captions, making the attack surface significant in websites relying on this plugin. The reflected nature of the XSS means it can be used in phishing campaigns or targeted attacks to compromise site visitors.
Potential Impact
The primary impact of CVE-2024-13515 is on the confidentiality and integrity of users interacting with vulnerable WordPress sites using the affected plugin. Successful exploitation can lead to session hijacking, theft of sensitive information, or execution of arbitrary scripts in the victim's browser, potentially enabling further attacks such as phishing or malware delivery. While availability is not directly impacted, the reputation and trustworthiness of affected websites can suffer, leading to loss of user confidence and potential business impact. Organizations hosting WordPress sites with this plugin may face increased risk of targeted attacks, especially if their user base is large or includes privileged users. The vulnerability's ease of exploitation without authentication but requiring user interaction makes it a moderate risk, particularly in environments where users are less security-aware. The lack of known exploits in the wild currently limits immediate widespread impact but does not preclude future exploitation. Overall, the threat is significant for website operators and their users, especially in sectors relying heavily on WordPress for content management.
Mitigation Recommendations
To mitigate CVE-2024-13515, organizations should immediately update the 'Image Source Control Lite – Show Image Credits and Captions' plugin to a patched version once available from the vendor. Until a patch is released, administrators can implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious script payloads in the 'path' parameter. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Site owners should audit and sanitize all user-controllable inputs rigorously, especially URL parameters, to prevent injection. Educating users to avoid clicking suspicious links can reduce exploitation likelihood. Additionally, monitoring web server logs for unusual query parameters and anomalous traffic patterns can help detect attempted exploitation. Regular security assessments and plugin inventory reviews should be conducted to identify and remediate vulnerable components promptly. Disabling or removing unused plugins reduces the attack surface. Finally, implementing multi-factor authentication (MFA) for user accounts can limit damage if session tokens are compromised.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13515: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webzunft Image Source Control Lite – Show Image Credits and Captions
Description
CVE-2024-13515 is a reflected Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Image Source Control Lite – Show Image Credits and Captions' by webzunft, affecting all versions up to 2. 28. 0. The flaw arises from improper sanitization and escaping of the 'path' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking users into clicking crafted links, leading to script execution in their browsers. This vulnerability can compromise user confidentiality and integrity but does not affect availability. The CVSS score is 6. 1 (medium severity), reflecting ease of exploitation without authentication but requiring user interaction. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential targeted attacks.
AI-Powered Analysis
Technical Analysis
CVE-2024-13515 identifies a reflected Cross-Site Scripting vulnerability in the 'Image Source Control Lite – Show Image Credits and Captions' WordPress plugin developed by webzunft. This vulnerability exists in all versions up to and including 2.28.0 due to insufficient input sanitization and output escaping of the 'path' parameter. When an attacker crafts a malicious URL containing a script payload in the 'path' parameter and convinces a user to click it, the injected script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising user confidentiality and integrity. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, indicating medium severity, with attack vector network, low attack complexity, no privileges required, user interaction required, and scope changed. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress environments for managing image credits and captions, making the attack surface significant in websites relying on this plugin. The reflected nature of the XSS means it can be used in phishing campaigns or targeted attacks to compromise site visitors.
Potential Impact
The primary impact of CVE-2024-13515 is on the confidentiality and integrity of users interacting with vulnerable WordPress sites using the affected plugin. Successful exploitation can lead to session hijacking, theft of sensitive information, or execution of arbitrary scripts in the victim's browser, potentially enabling further attacks such as phishing or malware delivery. While availability is not directly impacted, the reputation and trustworthiness of affected websites can suffer, leading to loss of user confidence and potential business impact. Organizations hosting WordPress sites with this plugin may face increased risk of targeted attacks, especially if their user base is large or includes privileged users. The vulnerability's ease of exploitation without authentication but requiring user interaction makes it a moderate risk, particularly in environments where users are less security-aware. The lack of known exploits in the wild currently limits immediate widespread impact but does not preclude future exploitation. Overall, the threat is significant for website operators and their users, especially in sectors relying heavily on WordPress for content management.
Mitigation Recommendations
To mitigate CVE-2024-13515, organizations should immediately update the 'Image Source Control Lite – Show Image Credits and Captions' plugin to a patched version once available from the vendor. Until a patch is released, administrators can implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious script payloads in the 'path' parameter. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Site owners should audit and sanitize all user-controllable inputs rigorously, especially URL parameters, to prevent injection. Educating users to avoid clicking suspicious links can reduce exploitation likelihood. Additionally, monitoring web server logs for unusual query parameters and anomalous traffic patterns can help detect attempted exploitation. Regular security assessments and plugin inventory reviews should be conducted to identify and remediate vulnerable components promptly. Disabling or removing unused plugins reduces the attack surface. Finally, implementing multi-factor authentication (MFA) for user accounts can limit damage if session tokens are compromised.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-17T17:06:43.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e5cb7ef31ef0b59ef1e
Added to database: 2/25/2026, 9:49:16 PM
Last enriched: 2/26/2026, 12:28:20 AM
Last updated: 2/26/2026, 6:11:47 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.