Skip to main content

CVE-2024-3062: CWE-79 Cross-Site Scripting (XSS) in Unknown Save as Image Plugin by Pdfcrowd

Medium
VulnerabilityCVE-2024-3062cvecve-2024-3062cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:09:44 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Save as Image Plugin by Pdfcrowd

Description

The Save as Image Plugin by Pdfcrowd WordPress plugin before 3.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 14:40:30 UTC

Technical Analysis

CVE-2024-3062 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Save as Image Plugin by Pdfcrowd for WordPress, affecting versions prior to 3.2.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high privilege users, such as administrators, to inject malicious scripts that are stored and executed when other users or administrators access affected pages. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security weakness. There are no known exploits in the wild at this time, and no official patches or updates have been linked in the provided data, though the issue is fixed in version 3.2.2 or later. The vulnerability primarily affects WordPress sites using this specific plugin, which is designed to convert content into images, potentially used in content protection or presentation scenarios.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the Save as Image Plugin by Pdfcrowd installed and not updated to the fixed version. The impact includes the potential for stored XSS attacks that could lead to session hijacking, privilege escalation, or defacement of websites. Since exploitation requires high privilege access and user interaction, the risk is somewhat mitigated but remains significant in environments where multiple administrators or editors manage content. In multisite WordPress setups common in larger organizations or educational institutions, the vulnerability could bypass typical content filtering restrictions, increasing the attack surface. The confidentiality and integrity of administrative sessions and data could be compromised, potentially leading to unauthorized actions or data leakage. While availability is not directly impacted, the reputational damage and potential compliance issues under GDPR related to unauthorized data access or manipulation could be substantial. Attackers might leverage this vulnerability as part of a broader attack chain, especially in targeted attacks against organizations with valuable web assets or sensitive user data.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the Save as Image Plugin by Pdfcrowd and confirm the plugin version. Upgrading to version 3.2.2 or later, where the vulnerability is patched, is the primary and most effective mitigation. In the absence of an immediate update, administrators should restrict plugin access to the minimum necessary number of users with high privileges and monitor for unusual activity or script injections in plugin settings. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads in plugin-related requests can provide temporary protection. Additionally, organizations should audit their multisite configurations to ensure strict role and capability assignments, minimizing the risk of privilege abuse. Regular security training for administrators on safe content management practices and awareness of XSS risks is also recommended. Finally, monitoring logs for signs of attempted exploitation and maintaining an incident response plan tailored to web application attacks will improve resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-03-28T20:41:07.762Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb716

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 2:40:30 PM

Last updated: 8/17/2025, 10:51:33 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats