Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13657: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in store-locator-pro Store Locator Widget

0
Medium
VulnerabilityCVE-2024-13657cvecve-2024-13657cwe-79
Published: Wed Feb 19 2025 (02/19/2025, 07:32:13 UTC)
Source: CVE Database V5
Vendor/Project: store-locator-pro
Product: Store Locator Widget

Description

CVE-2024-13657 is a stored cross-site scripting (XSS) vulnerability in the Store Locator Widget WordPress plugin, affecting all versions up to 20200131. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'storelocatorwidget' shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are reported in the wild yet. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:13:40 UTC

Technical Analysis

The Store Locator Widget plugin for WordPress suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2024-13657, classified under CWE-79. This vulnerability arises from improper neutralization of input during web page generation, specifically in the handling of the 'storelocatorwidget' shortcode. The plugin fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code. Because the malicious script is stored persistently, it executes every time a user visits the affected page, potentially compromising the confidentiality and integrity of user sessions. The vulnerability affects all versions up to and including 20200131. Exploitation does not require user interaction but does require authenticated access with relatively low privileges, increasing the risk within multi-user WordPress environments. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. No official patches or fixes have been linked yet, and no known exploits are currently observed in the wild. This vulnerability could be leveraged for session hijacking, privilege escalation, or delivering further malware payloads within affected WordPress sites.

Potential Impact

The impact of CVE-2024-13657 on organizations worldwide can be significant, especially for those relying on the Store Locator Widget plugin in their WordPress sites. Successful exploitation allows attackers with contributor-level access to inject persistent malicious scripts, which execute in the browsers of any users visiting the compromised pages. This can lead to theft of session cookies, unauthorized actions performed on behalf of users, defacement of website content, or distribution of malware. Since contributor-level access is often granted to multiple users, including content creators and editors, the attack surface is relatively broad within organizations. The vulnerability compromises confidentiality and integrity but does not directly affect availability. Organizations with high-traffic WordPress sites using this plugin risk reputational damage, data breaches, and potential regulatory consequences if user data is exposed. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate CVE-2024-13657, organizations should first verify if they use the Store Locator Widget plugin and identify the affected versions (all versions up to 20200131). Since no official patch links are provided, immediate mitigation steps include: 1) Restrict contributor-level and higher permissions to trusted users only, minimizing the risk of malicious script injection. 2) Remove or disable the 'storelocatorwidget' shortcode usage in posts and pages until a patch or update is available. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the shortcode parameters. 4) Monitor WordPress user activity logs for unusual behavior from contributors or editors. 5) Educate content contributors about the risks of injecting untrusted content and enforce strict content review processes. 6) Regularly check for updates from the plugin vendor or WordPress security advisories and apply patches promptly once available. 7) Consider replacing the vulnerable plugin with a secure alternative if timely patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T16:49:08.804Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e65b7ef31ef0b59fef6

Added to database: 2/25/2026, 9:49:25 PM

Last enriched: 2/25/2026, 11:13:40 PM

Last updated: 2/26/2026, 6:18:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats