Skip to main content

CVE-2024-13619: CWE-79 Cross-Site Scripting (XSS) in Unknown LifterLMS

Medium
VulnerabilityCVE-2024-13619cvecve-2024-13619cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:03 UTC)
Source: CVE
Vendor/Project: Unknown
Product: LifterLMS

Description

The LifterLMS WordPress plugin before 8.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

AI-Powered Analysis

AILast updated: 07/04/2025, 07:43:58 UTC

Technical Analysis

CVE-2024-13619 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the LifterLMS WordPress plugin versions prior to 8.0.1. LifterLMS is a popular learning management system plugin used to create and manage online courses within WordPress environments. The vulnerability arises because the plugin fails to properly sanitize and escape a specific parameter before reflecting it back in the webpage output. This improper handling allows an attacker to inject malicious scripts into the web page that are then executed in the context of users who visit the affected page. Since the vulnerability is reflected XSS, it requires the victim to click on a crafted URL or visit a maliciously crafted page containing the exploit. The vulnerability is particularly critical when targeting high-privilege users such as administrators, as successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed with elevated privileges. The CVSS v3.1 score of 6.1 (medium severity) reflects that the attack vector is network-based, requires no privileges but does require user interaction, and impacts confidentiality and integrity with a scope change (meaning the vulnerability can affect resources beyond the vulnerable component). No known exploits are currently reported in the wild, and no official patch links are provided yet, indicating that users should monitor for updates and apply them promptly once available. The vulnerability is categorized under CWE-79, which is a common and well-understood class of injection flaws affecting web applications.

Potential Impact

For European organizations using WordPress sites with the LifterLMS plugin, this vulnerability poses a tangible risk, especially for educational institutions, e-learning providers, and corporate training platforms that rely on LifterLMS. Exploitation could lead to unauthorized access to administrative accounts, allowing attackers to manipulate course content, access sensitive user data, or deploy further malware within the web environment. This could result in data breaches involving personal data of European citizens, triggering GDPR compliance issues and potential regulatory fines. The reflected XSS nature means phishing campaigns could be used to lure administrators into clicking malicious links, increasing the risk of targeted attacks. Additionally, compromised admin accounts could be leveraged to pivot into broader network infrastructure, increasing the overall security risk. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable without user interaction, somewhat limiting mass exploitation but still posing a significant threat to targeted high-value users.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should verify the version of LifterLMS in use and upgrade to version 8.0.1 or later as soon as the patch becomes available. Until then, organizations can implement Web Application Firewall (WAF) rules to detect and block typical reflected XSS attack patterns targeting the vulnerable parameter. Administrators should be trained to recognize suspicious URLs and avoid clicking on untrusted links. Additionally, applying Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Regular security audits and vulnerability scanning of WordPress plugins should be conducted to identify outdated or vulnerable components. Finally, organizations should enforce multi-factor authentication (MFA) for admin accounts to reduce the risk of account compromise even if credentials are stolen via XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-22T15:38:58.507Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec234

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:43:58 AM

Last updated: 8/4/2025, 12:32:57 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats