Skip to main content

CVE-2024-13730: CWE-79 Cross-Site Scripting (XSS) in Unknown Podlove Podcast Publisher

Medium
VulnerabilityCVE-2024-13730cvecve-2024-13730cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:04 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Podlove Podcast Publisher

Description

The Podlove Podcast Publisher WordPress plugin before 4.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:54:36 UTC

Technical Analysis

CVE-2024-13730 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Podlove Podcast Publisher WordPress plugin versions prior to 4.2.1. This vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. Specifically, even when the WordPress capability 'unfiltered_html' is disallowed (a common restriction in multisite WordPress setups), high-privilege users such as administrators can inject malicious scripts that are stored persistently within the plugin's settings. When these stored scripts are later rendered in the WordPress admin interface or potentially on the front-end, they can execute in the context of other users' browsers. The CVSS 3.1 base score of 4.8 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction required (UI:R), scope changed (S:C), and limited confidentiality and integrity impact (C:L, I:L), but no availability impact (A:N). The vulnerability is significant because it bypasses the usual WordPress restriction on unfiltered HTML for non-super-admin users in multisite environments, thereby expanding the attack surface for stored XSS. Although no known exploits are reported in the wild, the vulnerability could be leveraged by an attacker with administrative access to inject malicious JavaScript payloads that execute in other administrators' or editors' browsers, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment. The lack of a patch link suggests that remediation may require updating to version 4.2.1 or later once available, or applying manual mitigations.

Potential Impact

For European organizations using WordPress sites with the Podlove Podcast Publisher plugin, this vulnerability poses a risk primarily in environments where multiple administrators or privileged users manage the site, especially multisite WordPress installations common in enterprises or media companies. Exploitation could lead to unauthorized actions performed in the context of other high-privilege users, including theft of authentication tokens, unauthorized content changes, or deployment of further malicious code. This can compromise the confidentiality and integrity of the website content and user data. Given the plugin's focus on podcast publishing, media organizations and broadcasters in Europe could be targeted, potentially impacting their digital presence and reputation. Additionally, compromised administrative accounts could be leveraged to pivot into broader network attacks or data breaches, which are subject to strict regulatory scrutiny under GDPR. The medium severity score reflects that exploitation requires high privileges and user interaction, limiting the attacker's initial access vector but not eliminating risk in insider threat scenarios or compromised admin accounts.

Mitigation Recommendations

European organizations should prioritize updating the Podlove Podcast Publisher plugin to version 4.2.1 or later as soon as it becomes available to ensure the vulnerability is patched. Until then, administrators should restrict plugin access strictly to trusted users and audit user privileges to minimize the number of high-privilege accounts. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly scanning WordPress installations with security tools that detect stored XSS payloads can help identify exploitation attempts. Additionally, organizations should enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account compromise. Monitoring administrative actions and logs for unusual behavior can provide early detection of exploitation attempts. For multisite setups, consider isolating podcast publisher instances or limiting plugin usage to reduce attack surface. Finally, educating administrators about the risks of injecting untrusted content into plugin settings can prevent inadvertent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-24T19:44:00.361Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec23c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:54:36 AM

Last updated: 8/5/2025, 7:00:53 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats