Skip to main content

CVE-2024-13823: CWE-79 Cross-Site Scripting (XSS) in Unknown 360 Product Rotation

Medium
VulnerabilityCVE-2024-13823cvecve-2024-13823cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:04 UTC)
Source: CVE
Vendor/Project: Unknown
Product: 360 Product Rotation

Description

The 360 Product Rotation WordPress plugin through 1.5.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.

AI-Powered Analysis

AILast updated: 07/04/2025, 07:54:49 UTC

Technical Analysis

CVE-2024-13823 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the 360 Product Rotation WordPress plugin, affecting versions through 1.5.8. This vulnerability arises because the plugin fails to properly sanitize and escape a parameter before reflecting it back in the web page output. As a result, an attacker can craft a malicious URL containing executable JavaScript code that, when visited by an unauthenticated user, executes in the context of the victim's browser. This can lead to theft of session cookies, redirection to malicious sites, or other client-side attacks. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction needed, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability affects unauthenticated users, meaning attackers do not need valid credentials to exploit it, but victims must interact by clicking a crafted link or visiting a malicious page. The scope is changed, indicating that the vulnerability affects resources beyond the vulnerable component itself, potentially impacting the entire web application session or user data. The plugin is used within WordPress environments to provide 360-degree product rotation features, commonly employed by e-commerce sites to enhance product visualization.

Potential Impact

For European organizations, especially those operating e-commerce platforms or websites using the 360 Product Rotation WordPress plugin, this vulnerability poses a risk of client-side attacks against their visitors. Exploitation could result in session hijacking, theft of sensitive user data, or redirection to phishing or malware sites, undermining user trust and potentially leading to reputational damage and regulatory scrutiny under GDPR if personal data is compromised. Although the vulnerability requires user interaction and affects only unauthenticated users, the widespread use of WordPress and the plugin in retail and marketing sectors across Europe could expose a significant number of end users. The reflected XSS could also be leveraged in targeted phishing campaigns against European customers or partners. The impact on confidentiality and integrity is low but non-negligible, and the scope change means that the vulnerability could affect multiple users or sessions once exploited. Availability is not impacted, so service disruption is unlikely. Overall, the threat is moderate but relevant for organizations prioritizing customer data protection and web application security.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the 360 Product Rotation plugin is in use and verify the version. Since no official patch links are provided yet, organizations should consider the following specific mitigations: 1) Temporarily disable or remove the 360 Product Rotation plugin until a security update is released. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the vulnerable parameter, focusing on typical XSS payload signatures. 3) Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of reflected XSS. 4) Educate web administrators and content teams to avoid embedding user-controllable parameters in URLs or pages without proper encoding. 5) Monitor web server and application logs for unusual URL requests or error patterns indicative of attempted exploitation. 6) Prepare to apply vendor patches promptly once available and test updates in staging environments before production deployment. 7) Encourage end users to use updated browsers with built-in XSS protections and to avoid clicking suspicious links. These targeted actions go beyond generic advice by focusing on immediate plugin management, WAF tuning, and CSP deployment tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-31T20:53:15.848Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec23e

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:54:49 AM

Last updated: 7/29/2025, 4:22:23 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats