CVE-2024-3062: CWE-79 Cross-Site Scripting (XSS) in Unknown Save as Image Plugin by Pdfcrowd
The Save as Image Plugin by Pdfcrowd WordPress plugin before 3.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2024-3062 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Save as Image Plugin by Pdfcrowd for WordPress, affecting versions prior to 3.2.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high privilege users, such as administrators, to inject malicious scripts that are stored and executed when other users or administrators access affected pages. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security weakness. There are no known exploits in the wild at this time, and no official patches or updates have been linked in the provided data, though the issue is fixed in version 3.2.2 or later. The vulnerability primarily affects WordPress sites using this specific plugin, which is designed to convert content into images, potentially used in content protection or presentation scenarios.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the Save as Image Plugin by Pdfcrowd installed and not updated to the fixed version. The impact includes the potential for stored XSS attacks that could lead to session hijacking, privilege escalation, or defacement of websites. Since exploitation requires high privilege access and user interaction, the risk is somewhat mitigated but remains significant in environments where multiple administrators or editors manage content. In multisite WordPress setups common in larger organizations or educational institutions, the vulnerability could bypass typical content filtering restrictions, increasing the attack surface. The confidentiality and integrity of administrative sessions and data could be compromised, potentially leading to unauthorized actions or data leakage. While availability is not directly impacted, the reputational damage and potential compliance issues under GDPR related to unauthorized data access or manipulation could be substantial. Attackers might leverage this vulnerability as part of a broader attack chain, especially in targeted attacks against organizations with valuable web assets or sensitive user data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Save as Image Plugin by Pdfcrowd and confirm the plugin version. Upgrading to version 3.2.2 or later, where the vulnerability is patched, is the primary and most effective mitigation. In the absence of an immediate update, administrators should restrict plugin access to the minimum necessary number of users with high privileges and monitor for unusual activity or script injections in plugin settings. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads in plugin-related requests can provide temporary protection. Additionally, organizations should audit their multisite configurations to ensure strict role and capability assignments, minimizing the risk of privilege abuse. Regular security training for administrators on safe content management practices and awareness of XSS risks is also recommended. Finally, monitoring logs for signs of attempted exploitation and maintaining an incident response plan tailored to web application attacks will improve resilience.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-3062: CWE-79 Cross-Site Scripting (XSS) in Unknown Save as Image Plugin by Pdfcrowd
Description
The Save as Image Plugin by Pdfcrowd WordPress plugin before 3.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2024-3062 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Save as Image Plugin by Pdfcrowd for WordPress, affecting versions prior to 3.2.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high privilege users, such as administrators, to inject malicious scripts that are stored and executed when other users or administrators access affected pages. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security weakness. There are no known exploits in the wild at this time, and no official patches or updates have been linked in the provided data, though the issue is fixed in version 3.2.2 or later. The vulnerability primarily affects WordPress sites using this specific plugin, which is designed to convert content into images, potentially used in content protection or presentation scenarios.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the Save as Image Plugin by Pdfcrowd installed and not updated to the fixed version. The impact includes the potential for stored XSS attacks that could lead to session hijacking, privilege escalation, or defacement of websites. Since exploitation requires high privilege access and user interaction, the risk is somewhat mitigated but remains significant in environments where multiple administrators or editors manage content. In multisite WordPress setups common in larger organizations or educational institutions, the vulnerability could bypass typical content filtering restrictions, increasing the attack surface. The confidentiality and integrity of administrative sessions and data could be compromised, potentially leading to unauthorized actions or data leakage. While availability is not directly impacted, the reputational damage and potential compliance issues under GDPR related to unauthorized data access or manipulation could be substantial. Attackers might leverage this vulnerability as part of a broader attack chain, especially in targeted attacks against organizations with valuable web assets or sensitive user data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Save as Image Plugin by Pdfcrowd and confirm the plugin version. Upgrading to version 3.2.2 or later, where the vulnerability is patched, is the primary and most effective mitigation. In the absence of an immediate update, administrators should restrict plugin access to the minimum necessary number of users with high privileges and monitor for unusual activity or script injections in plugin settings. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads in plugin-related requests can provide temporary protection. Additionally, organizations should audit their multisite configurations to ensure strict role and capability assignments, minimizing the risk of privilege abuse. Regular security training for administrators on safe content management practices and awareness of XSS risks is also recommended. Finally, monitoring logs for signs of attempted exploitation and maintaining an incident response plan tailored to web application attacks will improve resilience.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-03-28T20:41:07.762Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb716
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 2:40:30 PM
Last updated: 8/17/2025, 10:51:33 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.