CVE-2024-2643: CWE-79 Cross-Site Scripting (XSS) in Unknown Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme
The Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any WordPress plugin before 2.6.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2024-2643 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin known as Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme, specifically in versions prior to 2.6.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The attack vector requires the attacker to have high privileges (admin level) and user interaction (admin must save or update settings containing the malicious payload). The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or defacement within the WordPress admin interface or potentially to site visitors if the stored scripts are rendered on public pages. The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common and well-understood XSS category. No official patch links are provided in the data, but upgrading to version 2.6.8 or later is implied as the remediation. This vulnerability is relevant to organizations running WordPress sites with this plugin installed, especially those with multisite setups or strict HTML filtering policies, as it bypasses some of these protections.
Potential Impact
For European organizations, the impact of CVE-2024-2643 can range from moderate to significant depending on the role of the affected WordPress sites. Many European businesses, government agencies, and NGOs use WordPress for public-facing websites, intranets, and internal portals. A successful stored XSS attack could allow an attacker with admin credentials to inject malicious scripts that compromise user sessions, steal sensitive data, or manipulate site content. This could lead to data breaches involving personal data protected under GDPR, reputational damage, and potential regulatory fines. Multisite WordPress installations, common in large organizations or agencies managing multiple sites, are particularly at risk since the vulnerability bypasses unfiltered_html restrictions. While exploitation requires admin privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The lack of known active exploits reduces immediate risk, but the presence of a public CVE and medium severity score means attackers may develop exploits in the future. European organizations with strict compliance requirements should prioritize addressing this vulnerability to avoid indirect impacts on confidentiality and integrity of their web platforms.
Mitigation Recommendations
1. Immediate upgrade of the Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme plugin to version 2.6.8 or later where the vulnerability is fixed. 2. Restrict administrative access to WordPress dashboards to trusted personnel only and enforce strong authentication mechanisms such as MFA to reduce risk of compromised admin accounts. 3. Regularly audit installed plugins and their versions to identify and remediate vulnerable components promptly. 4. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script sources and execution contexts. 5. Use security plugins that scan for malicious code injections and monitor for unusual admin activity. 6. In multisite environments, review and tighten user role permissions and capabilities to minimize the number of users with high privileges. 7. Conduct periodic security training for administrators to recognize and avoid introducing malicious content in plugin settings. 8. Monitor WordPress security advisories and threat intelligence feeds for any emerging exploits related to this CVE to respond quickly if active exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-2643: CWE-79 Cross-Site Scripting (XSS) in Unknown Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme
Description
The Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any WordPress plugin before 2.6.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2024-2643 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin known as Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme, specifically in versions prior to 2.6.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The attack vector requires the attacker to have high privileges (admin level) and user interaction (admin must save or update settings containing the malicious payload). The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or defacement within the WordPress admin interface or potentially to site visitors if the stored scripts are rendered on public pages. The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No known exploits in the wild have been reported to date. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common and well-understood XSS category. No official patch links are provided in the data, but upgrading to version 2.6.8 or later is implied as the remediation. This vulnerability is relevant to organizations running WordPress sites with this plugin installed, especially those with multisite setups or strict HTML filtering policies, as it bypasses some of these protections.
Potential Impact
For European organizations, the impact of CVE-2024-2643 can range from moderate to significant depending on the role of the affected WordPress sites. Many European businesses, government agencies, and NGOs use WordPress for public-facing websites, intranets, and internal portals. A successful stored XSS attack could allow an attacker with admin credentials to inject malicious scripts that compromise user sessions, steal sensitive data, or manipulate site content. This could lead to data breaches involving personal data protected under GDPR, reputational damage, and potential regulatory fines. Multisite WordPress installations, common in large organizations or agencies managing multiple sites, are particularly at risk since the vulnerability bypasses unfiltered_html restrictions. While exploitation requires admin privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The lack of known active exploits reduces immediate risk, but the presence of a public CVE and medium severity score means attackers may develop exploits in the future. European organizations with strict compliance requirements should prioritize addressing this vulnerability to avoid indirect impacts on confidentiality and integrity of their web platforms.
Mitigation Recommendations
1. Immediate upgrade of the Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme plugin to version 2.6.8 or later where the vulnerability is fixed. 2. Restrict administrative access to WordPress dashboards to trusted personnel only and enforce strong authentication mechanisms such as MFA to reduce risk of compromised admin accounts. 3. Regularly audit installed plugins and their versions to identify and remediate vulnerable components promptly. 4. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script sources and execution contexts. 5. Use security plugins that scan for malicious code injections and monitor for unusual admin activity. 6. In multisite environments, review and tighten user role permissions and capabilities to minimize the number of users with high privileges. 7. Conduct periodic security training for administrators to recognize and avoid introducing malicious content in plugin settings. 8. Monitor WordPress security advisories and threat intelligence feeds for any emerging exploits related to this CVE to respond quickly if active exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-03-19T13:36:31.527Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeb092
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 12:26:03 PM
Last updated: 8/14/2025, 12:11:56 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.