CVE-2024-13690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ashishajani WP Church Donation
CVE-2024-13690 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WP Church Donation WordPress plugin, affecting all versions up to 1. 7. It allows unauthenticated attackers to inject malicious scripts via donation form parameters due to improper input sanitization and output escaping. Exploited scripts execute whenever a user views the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication or user interaction and has a CVSS score of 7. 2, indicating a significant risk. No known public exploits exist yet, but the vulnerability's nature and ease of exploitation make it a critical concern for websites using this plugin. Organizations relying on WP Church Donation should prioritize patching or applying mitigations to prevent exploitation. Countries with large WordPress user bases and active religious or donation-related websites are most at risk. Immediate action is recommended to safeguard user data and maintain site integrity.
AI Analysis
Technical Summary
CVE-2024-13690 identifies a stored Cross-Site Scripting (XSS) vulnerability in the WP Church Donation plugin for WordPress, maintained by ashishajani. The vulnerability exists in all versions up to and including 1.7, caused by insufficient input sanitization and lack of proper output escaping on several donation form submission parameters. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently on the server and executed in the context of any user who accesses the affected pages. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS 3.1 base score of 7.2 reflects a high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss, as attackers can steal session cookies, perform actions on behalf of users, or manipulate page content. No patches or fixes have been linked yet, and no known exploits are reported in the wild. Given WordPress's widespread use and the plugin's niche for church donation management, the vulnerability presents a significant risk for websites relying on this plugin for donation processing and user interaction.
Potential Impact
The impact of CVE-2024-13690 is considerable for organizations using the WP Church Donation plugin. Successful exploitation can lead to session hijacking, enabling attackers to impersonate legitimate users, potentially including administrators. This can result in unauthorized actions such as modifying donation data, defacing the website, or redirecting users to malicious domains. The stored nature of the XSS means the malicious script persists and affects all visitors to the compromised pages, amplifying the attack's reach. Confidentiality is impacted as attackers may steal sensitive user information or authentication tokens. Integrity is compromised through unauthorized content manipulation. Although availability is not directly affected, the reputational damage and potential loss of donor trust can have severe business consequences, especially for religious organizations relying on donations. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, making it a critical concern for affected sites worldwide.
Mitigation Recommendations
To mitigate CVE-2024-13690, organizations should first check for any official patches or updates from the plugin developer and apply them immediately once available. In the absence of an official patch, implement strict input validation and sanitization on all donation form parameters, ensuring that any user-supplied data is properly escaped before rendering in HTML contexts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Disable or restrict the plugin temporarily if feasible, especially on high-traffic or sensitive sites. Conduct thorough code reviews of the plugin's input handling and output generation to identify and remediate similar vulnerabilities. Additionally, monitor web server logs and user reports for suspicious activity indicative of exploitation attempts. Educate site administrators on the risks of XSS and encourage the use of security plugins that provide additional XSS protection. Finally, maintain regular backups and incident response plans to quickly recover from any successful attacks.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Brazil, India, South Africa, Philippines, Italy
CVE-2024-13690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ashishajani WP Church Donation
Description
CVE-2024-13690 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WP Church Donation WordPress plugin, affecting all versions up to 1. 7. It allows unauthenticated attackers to inject malicious scripts via donation form parameters due to improper input sanitization and output escaping. Exploited scripts execute whenever a user views the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability requires no authentication or user interaction and has a CVSS score of 7. 2, indicating a significant risk. No known public exploits exist yet, but the vulnerability's nature and ease of exploitation make it a critical concern for websites using this plugin. Organizations relying on WP Church Donation should prioritize patching or applying mitigations to prevent exploitation. Countries with large WordPress user bases and active religious or donation-related websites are most at risk. Immediate action is recommended to safeguard user data and maintain site integrity.
AI-Powered Analysis
Technical Analysis
CVE-2024-13690 identifies a stored Cross-Site Scripting (XSS) vulnerability in the WP Church Donation plugin for WordPress, maintained by ashishajani. The vulnerability exists in all versions up to and including 1.7, caused by insufficient input sanitization and lack of proper output escaping on several donation form submission parameters. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently on the server and executed in the context of any user who accesses the affected pages. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS 3.1 base score of 7.2 reflects a high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss, as attackers can steal session cookies, perform actions on behalf of users, or manipulate page content. No patches or fixes have been linked yet, and no known exploits are reported in the wild. Given WordPress's widespread use and the plugin's niche for church donation management, the vulnerability presents a significant risk for websites relying on this plugin for donation processing and user interaction.
Potential Impact
The impact of CVE-2024-13690 is considerable for organizations using the WP Church Donation plugin. Successful exploitation can lead to session hijacking, enabling attackers to impersonate legitimate users, potentially including administrators. This can result in unauthorized actions such as modifying donation data, defacing the website, or redirecting users to malicious domains. The stored nature of the XSS means the malicious script persists and affects all visitors to the compromised pages, amplifying the attack's reach. Confidentiality is impacted as attackers may steal sensitive user information or authentication tokens. Integrity is compromised through unauthorized content manipulation. Although availability is not directly affected, the reputational damage and potential loss of donor trust can have severe business consequences, especially for religious organizations relying on donations. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, making it a critical concern for affected sites worldwide.
Mitigation Recommendations
To mitigate CVE-2024-13690, organizations should first check for any official patches or updates from the plugin developer and apply them immediately once available. In the absence of an official patch, implement strict input validation and sanitization on all donation form parameters, ensuring that any user-supplied data is properly escaped before rendering in HTML contexts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Disable or restrict the plugin temporarily if feasible, especially on high-traffic or sensitive sites. Conduct thorough code reviews of the plugin's input handling and output generation to identify and remediate similar vulnerabilities. Additionally, monitor web server logs and user reports for suspicious activity indicative of exploitation attempts. Educate site administrators on the risks of XSS and encourage the use of security plugins that provide additional XSS protection. Finally, maintain regular backups and incident response plans to quickly recover from any successful attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T19:09:22.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e68b7ef31ef0b5a0180
Added to database: 2/25/2026, 9:49:28 PM
Last enriched: 2/25/2026, 10:41:39 PM
Last updated: 2/26/2026, 11:18:10 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.