Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13661: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptableeditor Table Editor

0
Medium
VulnerabilityCVE-2024-13661cvecve-2024-13661cwe-79
Published: Thu Jan 30 2025 (01/30/2025, 13:41:56 UTC)
Source: CVE Database V5
Vendor/Project: wptableeditor
Product: Table Editor

Description

CVE-2024-13661 is a stored Cross-Site Scripting (XSS) vulnerability in the Table Editor WordPress plugin (wptableeditor) affecting all versions up to 1. 5. 1. The flaw arises from improper input sanitization and output escaping on user-supplied attributes in the 'wptableeditor_vtabs' shortcode. Authenticated users with contributor-level or higher privileges can inject malicious scripts that execute whenever any user views the compromised page. The vulnerability has a CVSS 3. 1 score of 6. 4, indicating medium severity, with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to site confidentiality and integrity. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:12:56 UTC

Technical Analysis

CVE-2024-13661 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Table Editor plugin for WordPress, specifically within the 'wptableeditor_vtabs' shortcode functionality. This vulnerability exists in all versions up to and including 1.5.1 due to insufficient sanitization and escaping of user-supplied attributes. The flaw allows authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages or posts. When any user accesses a page containing the malicious shortcode, the injected script executes in their browser context, potentially leading to session hijacking, privilege escalation, or unauthorized actions on behalf of the user. The vulnerability is exploitable remotely over the network without user interaction, but requires the attacker to have at least contributor privileges, which are commonly granted to trusted users who can submit content. The CVSS 3.1 base score is 6.4, reflecting medium severity with a network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to affecting other users. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin. The root cause is the failure to properly neutralize input during web page generation, classified under CWE-79. The vulnerability can be mitigated by applying patches when available, restricting contributor privileges, and implementing additional input validation and output encoding on shortcode attributes.

Potential Impact

The impact of CVE-2024-13661 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows an attacker with contributor-level access to inject persistent malicious scripts that execute in the browsers of any user viewing the compromised pages. This can lead to theft of session cookies, enabling account takeover or privilege escalation, unauthorized actions performed on behalf of users, and potential distribution of malware. While availability is not directly impacted, the trustworthiness and security posture of the affected site can be severely undermined. Organizations relying on the Table Editor plugin for content management face risks of data leakage, reputational damage, and potential compliance violations. Since contributor privileges are often granted to multiple users, the attack surface is significant. The vulnerability's network accessibility and lack of required user interaction increase the likelihood of exploitation once an attacker gains contributor access. Although no known exploits are currently in the wild, the medium severity rating and common use of WordPress globally make this a notable threat that requires timely remediation.

Mitigation Recommendations

To mitigate CVE-2024-13661, organizations should take the following specific actions: 1) Immediately review and restrict contributor-level access to trusted users only, minimizing the number of users who can inject content. 2) Monitor existing content for suspicious or unexpected usage of the 'wptableeditor_vtabs' shortcode that may contain malicious scripts. 3) Apply any available patches or updates from the plugin vendor as soon as they are released to address the input sanitization flaws. 4) Implement additional server-side input validation and output encoding for shortcode attributes, either via custom filters or security plugins that sanitize content before rendering. 5) Employ Web Application Firewalls (WAFs) with rules targeting known XSS patterns in shortcode parameters to block exploitation attempts. 6) Educate content contributors about safe content practices and the risks of embedding untrusted code. 7) Regularly audit user privileges and plugin usage to detect and prevent privilege abuse. 8) Consider disabling or replacing the Table Editor plugin if timely patches are unavailable or if it is not essential to operations. These measures go beyond generic advice by focusing on access control, content monitoring, and layered defenses specific to the plugin's shortcode functionality.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T17:00:52.124Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e65b7ef31ef0b59ff02

Added to database: 2/25/2026, 9:49:25 PM

Last enriched: 2/25/2026, 11:12:56 PM

Last updated: 2/26/2026, 6:16:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats