Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4004: CWE-79 Cross-Site Scripting (XSS) in Advanced Cron Manager

0
Low
VulnerabilityCVE-2024-4004cvecve-2024-4004cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:09:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Advanced Cron Manager

Description

The Advanced Cron Manager WordPress plugin before 2.5.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 11/13/2025, 21:29:52 UTC

Technical Analysis

CVE-2024-4004 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Advanced Cron Manager WordPress plugin prior to version 2.5.7. The root cause is the plugin's failure to properly sanitize and escape certain settings fields, which allows high-privilege users, such as administrators, to inject malicious JavaScript code. This vulnerability is notable because it can be exploited even when the WordPress unfiltered_html capability is disabled, a common restriction in multisite environments to prevent script injection. The attack vector requires authenticated access with high privileges (admin level) and user interaction to trigger the malicious payload. Exploiting this vulnerability could allow attackers to execute arbitrary scripts in the context of the WordPress admin dashboard, potentially leading to session hijacking, privilege escalation, or manipulation of site content and settings. The CVSS 3.1 score is 3.5, indicating low severity due to the requirement of high privileges and user interaction, and the limited impact on confidentiality and integrity. No public exploits or active exploitation have been reported. The vulnerability underscores the importance of proper input validation and escaping in WordPress plugins, especially those managing critical site functions like cron jobs.

Potential Impact

For European organizations using WordPress sites with the Advanced Cron Manager plugin, this vulnerability could allow an attacker with administrative access to inject malicious scripts, potentially compromising the integrity and confidentiality of the WordPress admin session. While the impact is limited by the need for high privileges and user interaction, exploitation could lead to session hijacking, unauthorized changes to site configurations, or further lateral movement within the site environment. Organizations with multisite WordPress deployments are particularly at risk since the vulnerability bypasses the unfiltered_html capability restriction. This could affect the availability of administrative functions if attackers manipulate cron jobs or site settings maliciously. Although no known exploits exist in the wild, the presence of this vulnerability increases the attack surface for insider threats or compromised admin accounts. The overall risk to European organizations depends on the prevalence of this plugin in their WordPress installations and the security posture of their administrative user accounts.

Mitigation Recommendations

1. Immediately update the Advanced Cron Manager plugin to version 2.5.7 or later, where this vulnerability is fixed. 2. Restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as MFA to reduce the risk of compromised admin accounts. 3. Regularly audit WordPress user roles and capabilities to ensure that only necessary users have high privileges. 4. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 5. Monitor WordPress logs and plugin settings for unusual changes or script injections. 6. In multisite environments, review and tighten restrictions on plugin installations and updates. 7. Employ web application firewalls (WAFs) that can detect and block XSS attack patterns targeting WordPress admin interfaces. 8. Educate administrators about the risks of stored XSS and safe plugin management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-04-19T15:39:31.593Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe18

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 11/13/2025, 9:29:52 PM

Last updated: 11/22/2025, 5:55:54 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats