CVE-2024-13748: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webcodingplace Ultimate Classified Listings
CVE-2024-13748 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Classified Listings WordPress plugin affecting all versions up to 1. 4. It allows authenticated attackers with administrator privileges to inject malicious scripts via the Title parameter in multi-site installations or where unfiltered_html is disabled. The vulnerability arises from improper input sanitization and output escaping, enabling persistent script execution when users access the injected pages. Exploitation requires high privileges and no user interaction but is limited to specific WordPress configurations. The CVSS score is 4. 4 (medium severity), reflecting limited impact on confidentiality and integrity with no availability impact. No known exploits are reported in the wild. Organizations using multi-site WordPress setups with this plugin should prioritize patching or applying mitigations to prevent potential abuse. This vulnerability primarily affects websites running this plugin, with higher risk in regions with widespread WordPress multi-site usage and where this plugin is popular.
AI Analysis
Technical Summary
CVE-2024-13748 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Classified Listings plugin for WordPress, affecting all versions up to and including 1.4. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the Title parameter. This flaw allows authenticated attackers with administrator-level access to inject arbitrary JavaScript code into pages. The malicious scripts persist in the database and execute whenever any user accesses the compromised page. The vulnerability is constrained to multi-site WordPress installations or those with the unfiltered_html capability disabled, which restricts the ability to post unfiltered HTML content. Exploitation requires high privileges (administrator) but does not require user interaction once the malicious content is injected. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate page content. However, it does not affect availability. The CVSS 3.1 base score is 4.4, reflecting medium severity due to the requirement for high privileges and limited scope of affected installations. No public exploits have been reported yet. The vulnerability was published on February 20, 2025, and assigned by Wordfence. No official patches are listed, so mitigation may require plugin updates or configuration changes.
Potential Impact
The primary impact of CVE-2024-13748 is the potential for persistent cross-site scripting attacks within WordPress multi-site environments using the Ultimate Classified Listings plugin. An attacker with administrator privileges can inject malicious scripts that execute in the context of other users visiting the affected pages. This can lead to theft of sensitive information such as authentication cookies or tokens, unauthorized actions performed on behalf of users, defacement, or redirection to malicious sites. Although exploitation requires high privileges, the vulnerability increases risk if administrator accounts are compromised or insider threats exist. The impact is limited to confidentiality and integrity; availability is not affected. Organizations relying on multi-site WordPress setups with this plugin may face reputational damage, data leakage, or further compromise if attackers leverage this vulnerability. Since no known exploits are currently in the wild, the threat is moderate but could escalate if weaponized. The vulnerability's scope is limited to installations with multi-site enabled or unfiltered_html disabled, reducing the overall attack surface but still posing a significant risk to affected environments.
Mitigation Recommendations
1. Upgrade the Ultimate Classified Listings plugin to a version that addresses this vulnerability once available. Monitor vendor announcements for patches. 2. If no patch is currently available, restrict administrator access to trusted personnel only and audit admin accounts regularly to prevent unauthorized access. 3. For multi-site WordPress installations, consider disabling or limiting the use of the Ultimate Classified Listings plugin until a fix is applied. 4. Enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 5. Implement Web Application Firewall (WAF) rules to detect and block malicious input patterns targeting the Title parameter. 6. Regularly scan the website for injected scripts or anomalous content in classified listings pages. 7. Educate administrators about the risks of stored XSS and the importance of sanitizing inputs when managing content. 8. Review and tighten WordPress capability settings, especially related to unfiltered_html, to minimize exposure. 9. Backup website data frequently to enable recovery in case of compromise. 10. Monitor security advisories from WordPress and plugin developers for updates.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-13748: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webcodingplace Ultimate Classified Listings
Description
CVE-2024-13748 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Classified Listings WordPress plugin affecting all versions up to 1. 4. It allows authenticated attackers with administrator privileges to inject malicious scripts via the Title parameter in multi-site installations or where unfiltered_html is disabled. The vulnerability arises from improper input sanitization and output escaping, enabling persistent script execution when users access the injected pages. Exploitation requires high privileges and no user interaction but is limited to specific WordPress configurations. The CVSS score is 4. 4 (medium severity), reflecting limited impact on confidentiality and integrity with no availability impact. No known exploits are reported in the wild. Organizations using multi-site WordPress setups with this plugin should prioritize patching or applying mitigations to prevent potential abuse. This vulnerability primarily affects websites running this plugin, with higher risk in regions with widespread WordPress multi-site usage and where this plugin is popular.
AI-Powered Analysis
Technical Analysis
CVE-2024-13748 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Classified Listings plugin for WordPress, affecting all versions up to and including 1.4. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the Title parameter. This flaw allows authenticated attackers with administrator-level access to inject arbitrary JavaScript code into pages. The malicious scripts persist in the database and execute whenever any user accesses the compromised page. The vulnerability is constrained to multi-site WordPress installations or those with the unfiltered_html capability disabled, which restricts the ability to post unfiltered HTML content. Exploitation requires high privileges (administrator) but does not require user interaction once the malicious content is injected. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate page content. However, it does not affect availability. The CVSS 3.1 base score is 4.4, reflecting medium severity due to the requirement for high privileges and limited scope of affected installations. No public exploits have been reported yet. The vulnerability was published on February 20, 2025, and assigned by Wordfence. No official patches are listed, so mitigation may require plugin updates or configuration changes.
Potential Impact
The primary impact of CVE-2024-13748 is the potential for persistent cross-site scripting attacks within WordPress multi-site environments using the Ultimate Classified Listings plugin. An attacker with administrator privileges can inject malicious scripts that execute in the context of other users visiting the affected pages. This can lead to theft of sensitive information such as authentication cookies or tokens, unauthorized actions performed on behalf of users, defacement, or redirection to malicious sites. Although exploitation requires high privileges, the vulnerability increases risk if administrator accounts are compromised or insider threats exist. The impact is limited to confidentiality and integrity; availability is not affected. Organizations relying on multi-site WordPress setups with this plugin may face reputational damage, data leakage, or further compromise if attackers leverage this vulnerability. Since no known exploits are currently in the wild, the threat is moderate but could escalate if weaponized. The vulnerability's scope is limited to installations with multi-site enabled or unfiltered_html disabled, reducing the overall attack surface but still posing a significant risk to affected environments.
Mitigation Recommendations
1. Upgrade the Ultimate Classified Listings plugin to a version that addresses this vulnerability once available. Monitor vendor announcements for patches. 2. If no patch is currently available, restrict administrator access to trusted personnel only and audit admin accounts regularly to prevent unauthorized access. 3. For multi-site WordPress installations, consider disabling or limiting the use of the Ultimate Classified Listings plugin until a fix is applied. 4. Enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 5. Implement Web Application Firewall (WAF) rules to detect and block malicious input patterns targeting the Title parameter. 6. Regularly scan the website for injected scripts or anomalous content in classified listings pages. 7. Educate administrators about the risks of stored XSS and the importance of sanitizing inputs when managing content. 8. Review and tighten WordPress capability settings, especially related to unfiltered_html, to minimize exposure. 9. Backup website data frequently to enable recovery in case of compromise. 10. Monitor security advisories from WordPress and plugin developers for updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T21:05:09.201Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6cb7ef31ef0b5a0679
Added to database: 2/25/2026, 9:49:32 PM
Last enriched: 2/25/2026, 10:14:54 PM
Last updated: 2/26/2026, 8:41:05 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.