Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13590: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ayecode Ketchup Shortcodes

0
Medium
VulnerabilityCVE-2024-13590cvecve-2024-13590cwe-79
Published: Wed Jan 22 2025 (01/22/2025, 03:21:31 UTC)
Source: CVE Database V5
Vendor/Project: ayecode
Product: Ketchup Shortcodes

Description

CVE-2024-13590 is a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes WordPress plugin, affecting all versions up to 0. 1. 2. The flaw arises from improper sanitization and escaping of user-supplied attributes in the 'spacer' shortcode, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent abuse. The threat primarily affects WordPress sites using this plugin, which may be more common in countries with high WordPress adoption and active content management.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:29:33 UTC

Technical Analysis

CVE-2024-13590 identifies a stored Cross-Site Scripting (XSS) vulnerability in the ayecode Ketchup Shortcodes plugin for WordPress, specifically in the 'spacer' shortcode. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes, allowing an attacker with contributor-level or higher access to inject arbitrary JavaScript code into pages. Because the malicious script is stored within the shortcode content, it executes whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 0.1.2 of the plugin. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change with low confidentiality and integrity impact but no availability impact. No public exploits are currently known. The vulnerability is significant because contributor-level users are common in WordPress environments, and stored XSS can lead to persistent compromise. The lack of patches at the time of reporting means organizations must apply workarounds or restrict access until a fix is available.

Potential Impact

The impact of this vulnerability is primarily on the confidentiality and integrity of affected WordPress sites. An attacker with contributor-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of authentication tokens, defacement, or redirection to malicious sites. This can undermine user trust, lead to data breaches, and facilitate further attacks such as privilege escalation or malware distribution. Since the vulnerability requires authenticated access, the risk is somewhat limited to environments where contributor accounts are granted, but many WordPress sites allow such roles for content creators. The scope change means the vulnerability can affect resources beyond the immediate plugin, potentially impacting the entire site. Although availability is not directly affected, the reputational damage and potential regulatory consequences from data exposure can be significant. Organizations relying on this plugin without mitigation are at risk of persistent compromise and should act promptly.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. Until an official patch is released, administrators can disable or remove the Ketchup Shortcodes plugin if it is not essential. Implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode attributes or script tags can provide temporary protection. Regularly audit shortcode content for unauthorized scripts or unusual modifications. Encourage users with contributor roles to follow security best practices and monitor logs for abnormal activity. Once a patch becomes available, promptly update the plugin to the fixed version. Additionally, applying Content Security Policy (CSP) headers can reduce the impact of injected scripts by restricting script execution sources. Finally, educate site administrators and content creators about the risks of stored XSS and the importance of input validation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-21T14:55:15.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e61b7ef31ef0b59f4b3

Added to database: 2/25/2026, 9:49:21 PM

Last enriched: 2/25/2026, 11:29:33 PM

Last updated: 2/26/2026, 6:31:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats