Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1935: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in smub Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers

0
High
VulnerabilityCVE-2024-1935cvecve-2024-1935cwe-80
Published: Wed Mar 13 2024 (03/13/2024, 15:26:40 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers

Description

CVE-2024-1935 is a high-severity stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Giveaways and Contests by RafflePress' by smub, affecting all versions up to 1. 12. 5. The flaw arises from improper sanitization and escaping of the 'parent_url' parameter, allowing unauthenticated attackers to inject malicious scripts that execute when users visit the compromised pages. This vulnerability can lead to theft of user credentials, session hijacking, and unauthorized actions on behalf of users. Exploitation requires no authentication or user interaction, and the vulnerability impacts confidentiality and integrity without affecting availability. Although no known exploits are reported in the wild yet, the ease of exploitation and widespread use of the plugin make this a significant risk. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential attacks. Countries with large WordPress user bases and high adoption of this plugin are at greater risk. Immediate mitigation steps include input validation, output encoding, and monitoring for suspicious activity on affected sites.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:59:49 UTC

Technical Analysis

CVE-2024-1935 is a stored cross-site scripting (XSS) vulnerability classified under CWE-80, affecting the WordPress plugin 'Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers' developed by smub. The vulnerability exists in all plugin versions up to and including 1.12.5 due to insufficient sanitization and escaping of the 'parent_url' parameter. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into web pages generated by the plugin. When a user accesses a page containing the injected script, the malicious code executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable plugin itself, impacting confidentiality and integrity but not availability. No patches or exploit code are currently publicly available, but the risk remains significant due to the plugin's popularity and the ease of exploitation. The vulnerability highlights the critical need for proper input validation and output encoding in web applications, especially those handling user-supplied data in dynamic web content.

Potential Impact

The impact of CVE-2024-1935 on organizations worldwide can be substantial. Exploitation of this stored XSS vulnerability allows attackers to execute arbitrary scripts in the browsers of users visiting affected sites, leading to theft of sensitive information such as authentication tokens, cookies, and personal data. This can result in account takeover, unauthorized access to user accounts, and potential lateral movement within organizational networks if administrative users are targeted. The integrity of user interactions and data can be compromised, undermining trust in the affected websites and potentially causing reputational damage. While availability is not directly impacted, the indirect consequences of data breaches and compromised user accounts can lead to service disruptions and increased incident response costs. Given that the vulnerability requires no authentication or user interaction, it is highly accessible to attackers, increasing the likelihood of exploitation. Organizations relying on the affected plugin for marketing and user engagement must act swiftly to mitigate risks and protect their users.

Mitigation Recommendations

To mitigate CVE-2024-1935 effectively, organizations should: 1) Immediately update the 'Giveaways and Contests by RafflePress' plugin to a patched version once available; if no patch exists, consider temporarily disabling the plugin to prevent exploitation. 2) Implement strict input validation on the 'parent_url' parameter to reject or sanitize any suspicious input before processing. 3) Apply context-aware output encoding/escaping to all user-supplied data rendered in web pages to prevent script injection. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 5) Monitor web server and application logs for unusual requests or payloads targeting the vulnerable parameter. 6) Educate site administrators and developers on secure coding practices and the importance of timely updates. 7) Conduct regular security assessments and penetration testing focusing on input handling and output encoding. 8) Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this plugin. These measures, combined, will reduce the attack surface and protect users from exploitation until a permanent fix is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-27T15:09:07.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d44b7ef31ef0b56f886

Added to database: 2/25/2026, 9:44:36 PM

Last enriched: 2/26/2026, 9:59:49 AM

Last updated: 2/26/2026, 11:17:46 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats