Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3155: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in pickplugins Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks

0
Medium
VulnerabilityCVE-2024-3155cvecve-2024-3155cwe-80
Published: Tue May 21 2024 (05/21/2024, 02:32:59 UTC)
Source: CVE Database V5
Vendor/Project: pickplugins
Product: Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks

Description

CVE-2024-3155 is a stored cross-site scripting (XSS) vulnerability affecting multiple WordPress plugins from pickplugins, including Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, and Post Carousel – Combo Blocks, in all versions up to 2. 2. 80. The flaw arises from improper input sanitization and output escaping, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using these plugins should prioritize updating or applying mitigations to prevent exploitation. The threat primarily targets WordPress sites using these plugins, which are popular globally but especially in countries with high WordPress adoption.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:04:35 UTC

Technical Analysis

CVE-2024-3155 is a stored cross-site scripting (XSS) vulnerability classified under CWE-80, affecting several WordPress plugins developed by pickplugins: Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, and Post Carousel – Combo Blocks. The vulnerability exists in all versions up to and including 2.2.80 due to insufficient sanitization of user-supplied input and inadequate output escaping in multiple parameters. This flaw enables authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages managed by these plugins. Because the malicious scripts are stored persistently, they execute in the context of any user who views the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The CVSS 3.1 base score is 6.4, reflecting medium severity, with attack vector network-based, low attack complexity, requiring privileges (PR:L), no user interaction, and scope changed due to impact on other components. Although no active exploits have been reported, the vulnerability poses a significant risk given the widespread use of these plugins in WordPress environments. The root cause is the failure to properly neutralize HTML tags and script-related content in input fields, violating secure coding practices for web applications. The vulnerability affects the confidentiality and integrity of user data but does not impact availability. Mitigation requires patching the plugins once updates are available or applying strict input validation and output encoding as interim controls.

Potential Impact

The impact of CVE-2024-3155 is primarily on the confidentiality and integrity of data within affected WordPress sites. Exploitation allows an authenticated contributor or higher to inject persistent malicious scripts that execute in the browsers of site visitors, including administrators and other privileged users. This can lead to session hijacking, credential theft, unauthorized actions performed with elevated privileges, and potential site defacement. Organizations relying on these plugins for content display, form handling, or e-commerce functionality risk compromise of user accounts and sensitive data. The vulnerability does not directly affect availability but can indirectly cause service disruptions if exploited for defacement or administrative takeover. Given the plugins’ popularity in WordPress ecosystems worldwide, the threat could affect a large number of websites, including corporate, governmental, and e-commerce platforms. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but the ease of exploitation and lack of user interaction needed increase risk. Without mitigation, attackers can leverage this vulnerability to establish persistent footholds and escalate privileges within affected sites.

Mitigation Recommendations

1. Immediately restrict contributor and higher privileges to trusted users only, minimizing the risk of malicious script injection. 2. Monitor and audit user-generated content and plugin-managed pages for suspicious or unexpected script tags or HTML content. 3. Apply strict input validation and output encoding on all parameters handled by the affected plugins to neutralize script-related HTML tags. 4. Disable or remove unused or unnecessary pickplugins plugins to reduce attack surface. 5. Stay alert for official security patches or updates from pickplugins and apply them promptly once released. 6. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting these plugins. 7. Educate site administrators and contributors about the risks of XSS and safe content management practices. 8. Consider using Content Security Policy (CSP) headers to restrict script execution sources as an additional defense layer. 9. Regularly back up website data to enable recovery in case of compromise. 10. Conduct periodic security assessments and penetration testing focusing on plugin vulnerabilities and user privilege abuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-01T19:45:47.411Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8cb7ef31ef0b566276

Added to database: 2/25/2026, 9:41:32 PM

Last enriched: 2/26/2026, 6:04:35 AM

Last updated: 2/26/2026, 9:42:26 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats