Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13581: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in supporthost Simple Charts

0
Medium
VulnerabilityCVE-2024-13581cvecve-2024-13581cwe-79
Published: Tue Feb 18 2025 (02/18/2025, 04:21:10 UTC)
Source: CVE Database V5
Vendor/Project: supporthost
Product: Simple Charts

Description

CVE-2024-13581 is a stored Cross-Site Scripting (XSS) vulnerability in the Simple Charts WordPress plugin by supporthost, affecting all versions up to 1. 0. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in the 'simple_chart' shortcode to inject malicious scripts. These scripts execute whenever any user views the infected page, potentially compromising user data and session integrity. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. While no known exploits are currently reported in the wild, the vulnerability poses a risk to websites using this plugin. Mitigation requires applying patches when available, restricting contributor privileges, and implementing strict input validation and output escaping. Countries with significant WordPress usage and active web publishing communities are most at risk, including the United States, Germany, India, Brazil, and the United Kingdom.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:43:16 UTC

Technical Analysis

CVE-2024-13581 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Simple Charts plugin for WordPress, developed by supporthost. The flaw exists in all versions up to and including 1.0 due to improper neutralization of user input in the 'simple_chart' shortcode. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes before rendering them on web pages. This allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code that is stored persistently within the website's content. When other users access the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires no user interaction beyond visiting the compromised page and does not require elevated privileges beyond contributor access, which is commonly granted to content creators on WordPress sites. The CVSS 3.1 base score of 6.4 reflects a medium severity rating, considering the network attack vector, low attack complexity, and the partial impact on confidentiality and integrity without affecting availability. No public exploits have been reported yet, but the vulnerability's presence in a widely used CMS plugin increases the risk of future exploitation. The lack of available patches at the time of reporting necessitates interim mitigations to reduce exposure.

Potential Impact

This vulnerability can significantly impact organizations relying on WordPress websites with the Simple Charts plugin installed. Attackers with contributor access can embed malicious scripts that execute in the browsers of site visitors, potentially leading to theft of sensitive information such as authentication cookies, personal data, or administrative credentials. This can result in unauthorized access, defacement, or further compromise of the website and its users. The persistent nature of stored XSS means the malicious code remains active until removed, increasing the window of exposure. For organizations, this can lead to reputational damage, loss of customer trust, and regulatory compliance issues, especially if user data is compromised. Since contributor-level access is often granted to multiple users, insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The medium severity rating indicates a moderate but tangible risk that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Apply patches or updates from the plugin vendor as soon as they become available to address the input sanitization and output escaping flaws. 2. Until patches are released, restrict contributor-level access to trusted users only and review existing contributor accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'simple_chart' shortcode parameters. 4. Conduct regular security audits and code reviews of plugins and themes to identify unsafe input handling. 5. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on the website. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content submission guidelines. 7. Monitor website logs and user activity for signs of exploitation or anomalous behavior. 8. Consider disabling or replacing the Simple Charts plugin with a more secure alternative if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-21T14:27:35.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e61b7ef31ef0b59f438

Added to database: 2/25/2026, 9:49:21 PM

Last enriched: 2/25/2026, 11:43:16 PM

Last updated: 2/26/2026, 9:32:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats