CVE-2024-13704: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in themepoints Super Testimonials
CVE-2024-13704 is a high-severity stored cross-site scripting (XSS) vulnerability in the Super Testimonials WordPress plugin by themepoints, affecting all versions up to 4. 0. 1. The flaw arises from improper sanitization and escaping of the 'st_user_title' parameter, allowing unauthenticated attackers to inject malicious scripts that execute when users view affected pages. This vulnerability requires no authentication or user interaction and can compromise confidentiality and integrity by stealing session tokens or performing actions on behalf of users. Although no known exploits are reported in the wild yet, the vulnerability's ease of exploitation and scope pose significant risks to websites using this plugin. Organizations running WordPress sites with this plugin should prioritize patching or applying mitigations to prevent potential attacks. Countries with high WordPress usage and significant web presence are most at risk. Immediate mitigation includes disabling the plugin, applying any available updates, or implementing web application firewall (WAF) rules to sanitize inputs and block malicious payloads.
AI Analysis
Technical Summary
CVE-2024-13704 is a stored cross-site scripting vulnerability identified in the Super Testimonials plugin for WordPress, developed by themepoints. This vulnerability affects all versions up to and including 4.0.1. The root cause is insufficient input sanitization and output escaping of the 'st_user_title' parameter, which is used to display user titles in testimonial entries. Because the plugin fails to properly neutralize script-related HTML tags, an unauthenticated attacker can inject arbitrary JavaScript code into the testimonial content. When any user accesses a page containing the injected testimonial, the malicious script executes in their browser context. This can lead to theft of session cookies, user impersonation, or unauthorized actions performed with the victim's privileges. The vulnerability is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), a common XSS category. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to impact on other components. While no public exploits have been observed, the vulnerability's characteristics make it a significant threat to WordPress sites using this plugin. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-13704 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially stealing authentication cookies, session tokens, or other sensitive information. This can lead to account takeover, unauthorized actions such as changing user settings or posting malicious content, and further compromise of the website's integrity. Because the vulnerability is stored XSS, the malicious payload persists on the server, affecting all users who visit the infected pages. The attack requires no authentication or user interaction, increasing the risk of widespread exploitation. For organizations, this can result in reputational damage, loss of customer trust, data breaches, and compliance violations. E-commerce, financial, and high-traffic websites using the plugin are particularly vulnerable to targeted attacks and automated exploitation attempts.
Mitigation Recommendations
1. Immediately disable the Super Testimonials plugin if it is not essential to your website's functionality. 2. Monitor the vendor's official channels for patches or updates addressing CVE-2024-13704 and apply them promptly once available. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block malicious payloads targeting the 'st_user_title' parameter, focusing on script tags and suspicious input patterns. 4. Conduct input validation and output encoding on testimonial content at the application level if possible, sanitizing user inputs before storage and escaping outputs before rendering. 5. Restrict permissions for users who can submit testimonials to trusted roles only, reducing the risk of injection by unauthenticated or low-privilege users. 6. Regularly audit website content for unexpected or suspicious scripts embedded in testimonials or other user-generated content. 7. Educate site administrators and developers about the risks of stored XSS and secure coding practices to prevent similar vulnerabilities. 8. Consider alternative plugins with better security track records if immediate patching is not feasible.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-13704: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in themepoints Super Testimonials
Description
CVE-2024-13704 is a high-severity stored cross-site scripting (XSS) vulnerability in the Super Testimonials WordPress plugin by themepoints, affecting all versions up to 4. 0. 1. The flaw arises from improper sanitization and escaping of the 'st_user_title' parameter, allowing unauthenticated attackers to inject malicious scripts that execute when users view affected pages. This vulnerability requires no authentication or user interaction and can compromise confidentiality and integrity by stealing session tokens or performing actions on behalf of users. Although no known exploits are reported in the wild yet, the vulnerability's ease of exploitation and scope pose significant risks to websites using this plugin. Organizations running WordPress sites with this plugin should prioritize patching or applying mitigations to prevent potential attacks. Countries with high WordPress usage and significant web presence are most at risk. Immediate mitigation includes disabling the plugin, applying any available updates, or implementing web application firewall (WAF) rules to sanitize inputs and block malicious payloads.
AI-Powered Analysis
Technical Analysis
CVE-2024-13704 is a stored cross-site scripting vulnerability identified in the Super Testimonials plugin for WordPress, developed by themepoints. This vulnerability affects all versions up to and including 4.0.1. The root cause is insufficient input sanitization and output escaping of the 'st_user_title' parameter, which is used to display user titles in testimonial entries. Because the plugin fails to properly neutralize script-related HTML tags, an unauthenticated attacker can inject arbitrary JavaScript code into the testimonial content. When any user accesses a page containing the injected testimonial, the malicious script executes in their browser context. This can lead to theft of session cookies, user impersonation, or unauthorized actions performed with the victim's privileges. The vulnerability is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), a common XSS category. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to impact on other components. While no public exploits have been observed, the vulnerability's characteristics make it a significant threat to WordPress sites using this plugin. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-13704 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially stealing authentication cookies, session tokens, or other sensitive information. This can lead to account takeover, unauthorized actions such as changing user settings or posting malicious content, and further compromise of the website's integrity. Because the vulnerability is stored XSS, the malicious payload persists on the server, affecting all users who visit the infected pages. The attack requires no authentication or user interaction, increasing the risk of widespread exploitation. For organizations, this can result in reputational damage, loss of customer trust, data breaches, and compliance violations. E-commerce, financial, and high-traffic websites using the plugin are particularly vulnerable to targeted attacks and automated exploitation attempts.
Mitigation Recommendations
1. Immediately disable the Super Testimonials plugin if it is not essential to your website's functionality. 2. Monitor the vendor's official channels for patches or updates addressing CVE-2024-13704 and apply them promptly once available. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block malicious payloads targeting the 'st_user_title' parameter, focusing on script tags and suspicious input patterns. 4. Conduct input validation and output encoding on testimonial content at the application level if possible, sanitizing user inputs before storage and escaping outputs before rendering. 5. Restrict permissions for users who can submit testimonials to trusted roles only, reducing the risk of injection by unauthenticated or low-privilege users. 6. Regularly audit website content for unexpected or suspicious scripts embedded in testimonials or other user-generated content. 7. Educate site administrators and developers about the risks of stored XSS and secure coding practices to prevent similar vulnerabilities. 8. Consider alternative plugins with better security track records if immediate patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-24T14:22:24.945Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e69b7ef31ef0b5a02fc
Added to database: 2/25/2026, 9:49:29 PM
Last enriched: 2/25/2026, 10:26:59 PM
Last updated: 2/26/2026, 6:17:18 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.