CVE-2024-13589: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in johnnya23 YouTube Playlists with Schema
CVE-2024-13589 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'YouTube Playlists with Schema' by johnnya23, affecting all versions up to 2. 6. 1. The flaw arises from insufficient input sanitization and output escaping in the 'yt_grid' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation. Countries with significant WordPress usage and active contributor communities are at higher risk.
AI Analysis
Technical Summary
CVE-2024-13589 identifies a stored cross-site scripting vulnerability in the 'YouTube Playlists with Schema' WordPress plugin developed by johnnya23. This vulnerability exists in all versions up to and including 2.6.1 due to improper neutralization of user input in the 'yt_grid' shortcode attributes. Specifically, the plugin fails to adequately sanitize and escape user-supplied data before rendering it on web pages, enabling attackers with contributor-level or higher privileges to inject arbitrary JavaScript code. Because the malicious script is stored persistently in the website's content, it executes in the context of any user who visits the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires an authenticated attacker with contributor or higher privileges, which limits exposure to sites allowing such user roles. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk for websites using this plugin without updates or mitigations.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with contributor-level access to inject persistent malicious scripts into web pages, which execute in the browsers of all users who visit those pages. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, and website defacement. For organizations, this undermines user trust, can lead to data breaches, and may result in reputational damage or regulatory consequences. Since the vulnerability requires authenticated access, the risk is higher in environments where contributor roles are widely granted or where accounts are compromised. The scope includes all websites running the affected plugin versions, which may be numerous given WordPress's popularity. Although no known exploits are currently active, the vulnerability's medium severity and ease of exploitation by authenticated users make it a significant concern for affected sites.
Mitigation Recommendations
Organizations should immediately update the 'YouTube Playlists with Schema' plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should restrict contributor-level access to trusted users only and audit existing user roles to minimize risk. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute inputs can provide temporary protection. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly scanning WordPress sites for XSS vulnerabilities and monitoring logs for unusual activity related to the 'yt_grid' shortcode usage is recommended. Developers maintaining the plugin should apply proper input validation and output encoding to user-supplied data in shortcode attributes to prevent script injection.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Italy
CVE-2024-13589: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in johnnya23 YouTube Playlists with Schema
Description
CVE-2024-13589 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'YouTube Playlists with Schema' by johnnya23, affecting all versions up to 2. 6. 1. The flaw arises from insufficient input sanitization and output escaping in the 'yt_grid' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation. Countries with significant WordPress usage and active contributor communities are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13589 identifies a stored cross-site scripting vulnerability in the 'YouTube Playlists with Schema' WordPress plugin developed by johnnya23. This vulnerability exists in all versions up to and including 2.6.1 due to improper neutralization of user input in the 'yt_grid' shortcode attributes. Specifically, the plugin fails to adequately sanitize and escape user-supplied data before rendering it on web pages, enabling attackers with contributor-level or higher privileges to inject arbitrary JavaScript code. Because the malicious script is stored persistently in the website's content, it executes in the context of any user who visits the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires an authenticated attacker with contributor or higher privileges, which limits exposure to sites allowing such user roles. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk for websites using this plugin without updates or mitigations.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with contributor-level access to inject persistent malicious scripts into web pages, which execute in the browsers of all users who visit those pages. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, and website defacement. For organizations, this undermines user trust, can lead to data breaches, and may result in reputational damage or regulatory consequences. Since the vulnerability requires authenticated access, the risk is higher in environments where contributor roles are widely granted or where accounts are compromised. The scope includes all websites running the affected plugin versions, which may be numerous given WordPress's popularity. Although no known exploits are currently active, the vulnerability's medium severity and ease of exploitation by authenticated users make it a significant concern for affected sites.
Mitigation Recommendations
Organizations should immediately update the 'YouTube Playlists with Schema' plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should restrict contributor-level access to trusted users only and audit existing user roles to minimize risk. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute inputs can provide temporary protection. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly scanning WordPress sites for XSS vulnerabilities and monitoring logs for unusual activity related to the 'yt_grid' shortcode usage is recommended. Developers maintaining the plugin should apply proper input validation and output encoding to user-supplied data in shortcode attributes to prevent script injection.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-21T14:46:32.864Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e61b7ef31ef0b59f4af
Added to database: 2/25/2026, 9:49:21 PM
Last enriched: 2/25/2026, 11:29:44 PM
Last updated: 2/26/2026, 6:08:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.