Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13749: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in era404 StaffList

0
Medium
VulnerabilityCVE-2024-13749cvecve-2024-13749cwe-79
Published: Wed Feb 12 2025 (02/12/2025, 03:21:39 UTC)
Source: CVE Database V5
Vendor/Project: era404
Product: StaffList

Description

CVE-2024-13749 is a medium severity vulnerability in the era404 StaffList WordPress plugin, affecting all versions up to 3. 2. 3. It is a Cross-Site Request Forgery (CSRF) vulnerability caused by missing or incorrect nonce validation on the 'stafflist' page. This allows unauthenticated attackers to trick site administrators into executing malicious actions, such as updating settings or injecting malicious scripts. Exploitation requires user interaction, specifically an administrator clicking a crafted link. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized changes and potential script injection attacks.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:14:39 UTC

Technical Analysis

CVE-2024-13749 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the era404 StaffList plugin for WordPress, present in all versions up to and including 3.2.3. The root cause is the absence or improper implementation of nonce validation on the 'stafflist' page, which is intended to protect against unauthorized requests. Nonces are security tokens used to verify that a request originates from a legitimate user action within the site. Without proper nonce checks, attackers can craft malicious requests that, when executed by an authenticated administrator (via social engineering such as clicking a malicious link), can update plugin settings or inject malicious JavaScript code. This injected code can lead to Cross-Site Scripting (XSS) attacks, compromising the confidentiality and integrity of the affected site. The vulnerability has a CVSS 3.1 base score of 6.1, reflecting medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the attack can affect the web application's state and data. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or high-value targets. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of plugin settings and injection of malicious scripts, which can lead to Cross-Site Scripting (XSS) attacks. This compromises the confidentiality and integrity of the affected WordPress site by allowing attackers to execute arbitrary scripts in the context of the administrator's browser session. Potential consequences include theft of administrator credentials, session hijacking, defacement, or further malware distribution. Since the attack requires an administrator to interact with a malicious link, social engineering is a key factor. Organizations relying on the StaffList plugin risk unauthorized changes to their site configuration and potential compromise of sensitive data. This can damage organizational reputation, lead to data breaches, and disrupt normal operations. The vulnerability does not directly affect availability but can indirectly cause service disruptions if exploited for further attacks.

Mitigation Recommendations

1. Immediately restrict administrative access to trusted personnel and educate administrators about phishing and social engineering risks to reduce the chance of clicking malicious links. 2. Monitor and audit administrative actions on the WordPress site to detect unusual or unauthorized changes. 3. If a patch or update from era404 becomes available, apply it promptly to ensure nonce validation is correctly implemented. 4. In the absence of an official patch, implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the 'stafflist' page, especially those lacking valid nonces. 5. Disable or remove the StaffList plugin if it is not essential to reduce the attack surface. 6. Employ Content Security Policy (CSP) headers to mitigate the impact of potential XSS payloads. 7. Regularly back up the WordPress site and database to enable recovery in case of compromise. 8. Use security plugins that can detect and alert on unauthorized changes or script injections within WordPress.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-27T21:43:34.474Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6cb7ef31ef0b5a0682

Added to database: 2/25/2026, 9:49:32 PM

Last enriched: 2/25/2026, 10:14:39 PM

Last updated: 2/25/2026, 10:53:45 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats