Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4104: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in giuliopanda ADFO – Custom data in admin dashboard

0
Medium
VulnerabilityCVE-2024-4104cvecve-2024-4104cwe-79
Published: Thu May 09 2024 (05/09/2024, 20:03:41 UTC)
Source: CVE Database V5
Vendor/Project: giuliopanda
Product: ADFO – Custom data in admin dashboard

Description

CVE-2024-4104 is a reflected Cross-Site Scripting (XSS) vulnerability in the giuliopanda ADFO – Custom data in admin dashboard WordPress plugin, affecting all versions up to 1. 9. 0. The vulnerability arises from improper input sanitization and output escaping of the 'dbp_id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the context of the victim's browser. This can result in limited confidentiality and integrity impacts, such as session hijacking or unauthorized actions performed on behalf of the user. The CVSS score is 6. 1 (medium severity), reflecting network attack vector, no privileges required, but user interaction needed. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:28:32 UTC

Technical Analysis

CVE-2024-4104 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the giuliopanda ADFO – Custom data in admin dashboard WordPress plugin, present in all versions up to and including 1.9.0. The vulnerability stems from insufficient sanitization and escaping of the 'dbp_id' parameter, which is used during web page generation in the admin dashboard. Because the input is not properly neutralized, an attacker can craft a malicious URL containing a script payload in the 'dbp_id' parameter. When an unsuspecting user, such as an administrator or editor, clicks this URL, the injected script executes in their browser context. This reflected XSS does not require authentication, making it accessible to remote attackers. The vulnerability affects confidentiality and integrity by potentially allowing theft of session cookies, defacement of the admin interface, or execution of unauthorized actions. The CVSS 3.1 score of 6.1 reflects a network attack vector, low attack complexity, no privileges required, but requiring user interaction, with a scope change due to script execution in the victim's context. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is used within WordPress environments, which are widely deployed globally, especially in small to medium enterprises and personal websites.

Potential Impact

The primary impact of CVE-2024-4104 is the potential compromise of user session confidentiality and integrity within affected WordPress sites using the vulnerable plugin. Attackers can steal authentication cookies or tokens, enabling account takeover or privilege escalation. Additionally, malicious scripts could perform unauthorized actions on behalf of the user, such as changing settings or injecting further malicious content. While availability is not directly impacted, the trustworthiness and integrity of the admin dashboard are compromised, potentially leading to reputational damage and loss of control over the website. Organizations relying on this plugin, especially those with administrative users who might be targeted, face increased risk of compromise. Given the unauthenticated nature of the attack and the need for user interaction, phishing or social engineering campaigns could be used to exploit this vulnerability at scale. The widespread use of WordPress and the plugin's presence in many websites globally increases the potential attack surface.

Mitigation Recommendations

To mitigate CVE-2024-4104, organizations should immediately update the giuliopanda ADFO – Custom data in admin dashboard plugin to a patched version once available. In the absence of an official patch, administrators should implement strict input validation and output encoding for the 'dbp_id' parameter within the plugin code to neutralize malicious scripts. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious payloads targeting the 'dbp_id' parameter can provide interim protection. Additionally, administrators should educate users about the risks of clicking untrusted links, especially those purporting to lead to the admin dashboard. Enforcing multi-factor authentication (MFA) for WordPress admin accounts can reduce the impact of session hijacking. Regularly monitoring logs for unusual access patterns or script injection attempts is recommended. Finally, restricting access to the admin dashboard by IP whitelisting or VPN can further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-23T21:21:59.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b82b7ef31ef0b5561a7

Added to database: 2/25/2026, 9:37:06 PM

Last enriched: 2/26/2026, 12:28:32 AM

Last updated: 2/26/2026, 8:06:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats