CVE-2024-13590: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ayecode Ketchup Shortcodes
CVE-2024-13590 is a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes WordPress plugin, affecting all versions up to 0. 1. 2. The flaw arises from improper sanitization and escaping of user-supplied attributes in the 'spacer' shortcode, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent abuse. The threat primarily affects WordPress sites using this plugin, which may be more common in countries with high WordPress adoption and active content management.
AI Analysis
Technical Summary
CVE-2024-13590 identifies a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes plugin for WordPress, specifically in the 'spacer' shortcode. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes, allowing an attacker with contributor-level or higher access to inject arbitrary JavaScript code into pages. Because the malicious script is stored within the shortcode content, it executes whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 0.1.2 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change with low confidentiality and integrity impact but no availability impact. No public exploits are currently known. The vulnerability is significant because contributor-level users are common in WordPress environments, and stored XSS can lead to persistent compromise. The lack of patches at the time of reporting means organizations must apply workarounds or restrict access until a fix is available.
Potential Impact
The impact of this vulnerability is primarily on the confidentiality and integrity of affected WordPress sites. An attacker with contributor-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of authentication tokens, defacement, or redirection to malicious sites. This can undermine user trust, lead to data breaches, and facilitate further attacks such as privilege escalation or malware distribution. Since the vulnerability requires authenticated access, the risk is somewhat limited to environments where contributor accounts are granted, but many WordPress sites allow such roles for content creators. The scope change means the vulnerability can affect resources beyond the immediate plugin, potentially impacting the entire site. Although availability is not directly affected, the reputational damage and potential regulatory consequences from data exposure can be significant. Organizations relying on this plugin without mitigation are at risk of persistent compromise and should act promptly.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. Until an official patch is released, administrators can disable or remove the Ketchup Shortcodes plugin if it is not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode attributes or script tags can provide temporary protection. Regularly audit shortcode content for unauthorized scripts or unusual modifications. Encourage users with contributor roles to follow security best practices and monitor logs for abnormal activity. Once a patch becomes available, promptly update the plugin to the fixed version. Additionally, applying Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Finally, educate site administrators and content creators about the risks of stored XSS and the importance of input validation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13590: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ayecode Ketchup Shortcodes
Description
CVE-2024-13590 is a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes WordPress plugin, affecting all versions up to 0. 1. 2. The flaw arises from improper sanitization and escaping of user-supplied attributes in the 'spacer' shortcode, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent abuse. The threat primarily affects WordPress sites using this plugin, which may be more common in countries with high WordPress adoption and active content management.
AI-Powered Analysis
Technical Analysis
CVE-2024-13590 identifies a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes plugin for WordPress, specifically in the 'spacer' shortcode. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes, allowing an attacker with contributor-level or higher access to inject arbitrary JavaScript code into pages. Because the malicious script is stored within the shortcode content, it executes whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 0.1.2 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change with low confidentiality and integrity impact but no availability impact. No public exploits are currently known. The vulnerability is significant because contributor-level users are common in WordPress environments, and stored XSS can lead to persistent compromise. The lack of patches at the time of reporting means organizations must apply workarounds or restrict access until a fix is available.
Potential Impact
The impact of this vulnerability is primarily on the confidentiality and integrity of affected WordPress sites. An attacker with contributor-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of authentication tokens, defacement, or redirection to malicious sites. This can undermine user trust, lead to data breaches, and facilitate further attacks such as privilege escalation or malware distribution. Since the vulnerability requires authenticated access, the risk is somewhat limited to environments where contributor accounts are granted, but many WordPress sites allow such roles for content creators. The scope change means the vulnerability can affect resources beyond the immediate plugin, potentially impacting the entire site. Although availability is not directly affected, the reputational damage and potential regulatory consequences from data exposure can be significant. Organizations relying on this plugin without mitigation are at risk of persistent compromise and should act promptly.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. Until an official patch is released, administrators can disable or remove the Ketchup Shortcodes plugin if it is not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode attributes or script tags can provide temporary protection. Regularly audit shortcode content for unauthorized scripts or unusual modifications. Encourage users with contributor roles to follow security best practices and monitor logs for abnormal activity. Once a patch becomes available, promptly update the plugin to the fixed version. Additionally, applying Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Finally, educate site administrators and content creators about the risks of stored XSS and the importance of input validation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-21T14:55:15.744Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e61b7ef31ef0b59f4b3
Added to database: 2/25/2026, 9:49:21 PM
Last enriched: 2/25/2026, 11:29:33 PM
Last updated: 2/26/2026, 6:31:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.