CVE-2024-13665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sonalsinha21 Admire Extra
CVE-2024-13665 is a stored cross-site scripting (XSS) vulnerability in the Admire Extra WordPress plugin up to version 1. 6. It arises from improper sanitization and escaping of user-supplied attributes in the plugin's 'space' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the affected page. The vulnerability does not require user interaction to trigger but does require authenticated privileges. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity and partial confidentiality and integrity impact. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential session hijacking, defacement, or other script-based attacks. The threat primarily affects WordPress sites using this specific plugin, which may be more prevalent in countries with high WordPress adoption.
AI Analysis
Technical Summary
CVE-2024-13665 is a stored cross-site scripting vulnerability identified in the Admire Extra plugin for WordPress, affecting all versions up to and including 1.6. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes within the plugin's 'space' shortcode. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability is exploitable remotely over the network without user interaction but requires authenticated access, which limits the attack surface to users with some level of trust on the site. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to the impact on other users' confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors. The lack of official patches or updates at the time of publication necessitates immediate mitigation steps by administrators to prevent exploitation.
Potential Impact
The primary impact of CVE-2024-13665 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers with contributor-level access can inject malicious scripts that execute in the context of other users, potentially stealing cookies, session tokens, or performing actions on behalf of victims. This can lead to account takeover, unauthorized content modification, or distribution of malware. The vulnerability does not directly affect availability but can indirectly cause reputational damage and loss of user trust. Organizations running WordPress sites with the Admire Extra plugin face increased risk of targeted attacks, especially if contributor accounts are compromised or misused. The scope of impact includes all users who visit injected pages, expanding the threat beyond the initial attacker. Given WordPress's widespread use globally, the vulnerability could affect a large number of websites, particularly those with collaborative content creation workflows.
Mitigation Recommendations
To mitigate CVE-2024-13665, administrators should immediately restrict contributor-level privileges to trusted users only, minimizing the risk of malicious script injection. Until an official patch is released, consider disabling or removing the Admire Extra plugin to eliminate the attack vector. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute inputs that may contain script tags or event handlers. Regularly audit user-generated content for injected scripts and monitor logs for unusual activity indicative of exploitation attempts. Encourage users to use strong, unique passwords and enable multi-factor authentication to reduce the risk of account compromise. Additionally, site owners should sanitize and escape all user inputs rigorously in custom code and plugins to prevent similar vulnerabilities. Stay informed about updates from the plugin vendor and apply patches promptly once available.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, Brazil, France, Netherlands, Japan
CVE-2024-13665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sonalsinha21 Admire Extra
Description
CVE-2024-13665 is a stored cross-site scripting (XSS) vulnerability in the Admire Extra WordPress plugin up to version 1. 6. It arises from improper sanitization and escaping of user-supplied attributes in the plugin's 'space' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the affected page. The vulnerability does not require user interaction to trigger but does require authenticated privileges. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity and partial confidentiality and integrity impact. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential session hijacking, defacement, or other script-based attacks. The threat primarily affects WordPress sites using this specific plugin, which may be more prevalent in countries with high WordPress adoption.
AI-Powered Analysis
Technical Analysis
CVE-2024-13665 is a stored cross-site scripting vulnerability identified in the Admire Extra plugin for WordPress, affecting all versions up to and including 1.6. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes within the plugin's 'space' shortcode. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability is exploitable remotely over the network without user interaction but requires authenticated access, which limits the attack surface to users with some level of trust on the site. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to the impact on other users' confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors. The lack of official patches or updates at the time of publication necessitates immediate mitigation steps by administrators to prevent exploitation.
Potential Impact
The primary impact of CVE-2024-13665 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers with contributor-level access can inject malicious scripts that execute in the context of other users, potentially stealing cookies, session tokens, or performing actions on behalf of victims. This can lead to account takeover, unauthorized content modification, or distribution of malware. The vulnerability does not directly affect availability but can indirectly cause reputational damage and loss of user trust. Organizations running WordPress sites with the Admire Extra plugin face increased risk of targeted attacks, especially if contributor accounts are compromised or misused. The scope of impact includes all users who visit injected pages, expanding the threat beyond the initial attacker. Given WordPress's widespread use globally, the vulnerability could affect a large number of websites, particularly those with collaborative content creation workflows.
Mitigation Recommendations
To mitigate CVE-2024-13665, administrators should immediately restrict contributor-level privileges to trusted users only, minimizing the risk of malicious script injection. Until an official patch is released, consider disabling or removing the Admire Extra plugin to eliminate the attack vector. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute inputs that may contain script tags or event handlers. Regularly audit user-generated content for injected scripts and monitor logs for unusual activity indicative of exploitation attempts. Encourage users to use strong, unique passwords and enable multi-factor authentication to reduce the risk of account compromise. Additionally, site owners should sanitize and escape all user inputs rigorously in custom code and plugins to prevent similar vulnerabilities. Stay informed about updates from the plugin vendor and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T17:09:21.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e67b7ef31ef0b59ffc8
Added to database: 2/25/2026, 9:49:27 PM
Last enriched: 2/25/2026, 11:01:22 PM
Last updated: 2/26/2026, 8:11:11 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.