Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13757: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Master Slider – Responsive Touch Slider

0
Medium
VulnerabilityCVE-2024-13757cvecve-2024-13757cwe-79
Published: Wed Mar 05 2025 (03/05/2025, 09:21:45 UTC)
Source: CVE Database V5
Vendor/Project: averta
Product: Master Slider – Responsive Touch Slider

Description

CVE-2024-13757 is a stored cross-site scripting (XSS) vulnerability in the Master Slider – Responsive Touch Slider WordPress plugin up to version 3. 10. 6. It arises from improper input sanitization and output escaping in the ms_layer shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction beyond page access. No public exploits are currently known. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites globally, especially those with contributor-level user roles enabled.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:13:46 UTC

Technical Analysis

CVE-2024-13757 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the Master Slider – Responsive Touch Slider plugin for WordPress, versions up to and including 3.10.6. The vulnerability stems from insufficient sanitization and escaping of user-supplied attributes within the plugin's ms_layer shortcode functionality. Authenticated users with contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts that utilize the vulnerable shortcode. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability is remotely exploitable over the network without user interaction beyond page viewing, and the attack scope is broad due to the widespread use of WordPress and this popular plugin. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requiring privileges but no user interaction, with a scope change and partial confidentiality and integrity impact but no availability impact. No patches or official fixes have been linked yet, and no known exploits are reported in the wild, but the vulnerability poses a significant risk to sites allowing contributor-level access to untrusted users.

Potential Impact

The vulnerability enables attackers with contributor-level access to inject persistent malicious scripts into website content, which execute in the browsers of any visitors viewing the compromised pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. For organizations, this undermines user trust, can lead to data breaches, and may result in reputational damage or regulatory penalties. Since WordPress powers a large portion of the web and the Master Slider plugin is widely used, the potential impact is global and affects a broad range of industries including e-commerce, media, education, and government websites. The requirement for contributor-level access limits exploitation to environments where such roles are assigned to potentially untrusted users, but insider threats or compromised accounts increase risk. The vulnerability does not affect availability but compromises confidentiality and integrity, with a scope change meaning the impact extends beyond the initial vulnerable component to the entire site and its users.

Mitigation Recommendations

Organizations should immediately audit WordPress sites using the Master Slider – Responsive Touch Slider plugin to identify affected versions (up to 3.10.6). Until an official patch is released, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling or removing the plugin if contributor roles are widely assigned. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injection attempts targeting the ms_layer shortcode can provide interim protection. Site owners should also enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly review user roles and permissions to minimize the attack surface. Once a patch or update is available from the vendor, apply it promptly. Additionally, security teams should monitor logs for suspicious activity related to shortcode usage and script injection attempts. Educating content contributors about safe input practices can help reduce accidental injection risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-27T23:30:49.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6db7ef31ef0b5a06c1

Added to database: 2/25/2026, 9:49:33 PM

Last enriched: 2/25/2026, 10:13:46 PM

Last updated: 2/25/2026, 10:53:43 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats