CVE-2024-4895: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdatatables wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin
CVE-2024-4895 is a stored cross-site scripting (XSS) vulnerability in the wpDataTables WordPress plugin, affecting all versions up to 3. 4. 2. 12. The flaw arises from insufficient input sanitization and output escaping in the CSV import functionality, allowing unauthenticated attackers to inject malicious scripts. These scripts execute whenever a user accesses the compromised page, potentially leading to session hijacking or defacement. The vulnerability has a medium CVSS score of 4. 7, requiring user interaction and having a high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-4895 is a stored cross-site scripting (XSS) vulnerability identified in the wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin, which is widely used to create dynamic tables and charts within WordPress sites. The vulnerability exists in all plugin versions up to and including 3.4.2.12 and stems from improper neutralization of input during web page generation, specifically in the CSV import functionality. Due to insufficient input sanitization and lack of proper output escaping, an unauthenticated attacker can craft malicious CSV files containing embedded JavaScript payloads. When these files are imported into the plugin, the malicious scripts are stored persistently and executed in the context of any user who views the affected page. This stored XSS can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has a CVSS 3.1 base score of 4.7, indicating medium severity, with attack vector being network-based, no privileges required, but requiring user interaction (viewing the infected page), and high attack complexity. The scope is changed as the vulnerability affects the confidentiality and integrity of user data. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is tracked under CWE-79, a common and critical web security issue.
Potential Impact
The impact of CVE-2024-4895 on organizations worldwide can be significant, especially for those relying on the wpDataTables plugin for data presentation on WordPress sites. Successful exploitation allows attackers to inject persistent malicious scripts that execute in the browsers of site visitors or administrators. This can lead to theft of authentication cookies, enabling account takeover, unauthorized actions on behalf of users, defacement of websites, or distribution of malware. The vulnerability affects confidentiality and integrity but does not directly impact availability. Since the attack requires user interaction (visiting a compromised page), the risk is somewhat mitigated but still substantial given the popularity of WordPress and the plugin. Organizations with high-traffic WordPress sites, especially those handling sensitive user data or administrative functions, face increased risk. Additionally, the presence of unauthenticated exploitation means attackers can target any vulnerable site without needing credentials, increasing the attack surface. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's nature makes it a likely target for future attacks.
Mitigation Recommendations
To mitigate CVE-2024-4895, organizations should immediately update the wpDataTables plugin to a patched version once available. In the absence of an official patch, administrators should restrict or disable the CSV import functionality to prevent injection of malicious scripts. Implement strict input validation and sanitization on all imported CSV data, ensuring that any HTML or JavaScript content is neutralized before storage or rendering. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Monitor web server and application logs for unusual activity related to CSV imports or page views. Educate users and administrators about the risks of interacting with untrusted content on the site. Additionally, consider using web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the plugin. Regularly audit and scan WordPress installations for outdated plugins and known vulnerabilities. Finally, maintain backups and incident response plans to quickly recover from potential compromises.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan, Italy, Spain
CVE-2024-4895: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdatatables wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin
Description
CVE-2024-4895 is a stored cross-site scripting (XSS) vulnerability in the wpDataTables WordPress plugin, affecting all versions up to 3. 4. 2. 12. The flaw arises from insufficient input sanitization and output escaping in the CSV import functionality, allowing unauthenticated attackers to inject malicious scripts. These scripts execute whenever a user accesses the compromised page, potentially leading to session hijacking or defacement. The vulnerability has a medium CVSS score of 4. 7, requiring user interaction and having a high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-4895 is a stored cross-site scripting (XSS) vulnerability identified in the wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin, which is widely used to create dynamic tables and charts within WordPress sites. The vulnerability exists in all plugin versions up to and including 3.4.2.12 and stems from improper neutralization of input during web page generation, specifically in the CSV import functionality. Due to insufficient input sanitization and lack of proper output escaping, an unauthenticated attacker can craft malicious CSV files containing embedded JavaScript payloads. When these files are imported into the plugin, the malicious scripts are stored persistently and executed in the context of any user who views the affected page. This stored XSS can lead to session hijacking, defacement, or redirection to malicious sites. The vulnerability has a CVSS 3.1 base score of 4.7, indicating medium severity, with attack vector being network-based, no privileges required, but requiring user interaction (viewing the infected page), and high attack complexity. The scope is changed as the vulnerability affects the confidentiality and integrity of user data. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is tracked under CWE-79, a common and critical web security issue.
Potential Impact
The impact of CVE-2024-4895 on organizations worldwide can be significant, especially for those relying on the wpDataTables plugin for data presentation on WordPress sites. Successful exploitation allows attackers to inject persistent malicious scripts that execute in the browsers of site visitors or administrators. This can lead to theft of authentication cookies, enabling account takeover, unauthorized actions on behalf of users, defacement of websites, or distribution of malware. The vulnerability affects confidentiality and integrity but does not directly impact availability. Since the attack requires user interaction (visiting a compromised page), the risk is somewhat mitigated but still substantial given the popularity of WordPress and the plugin. Organizations with high-traffic WordPress sites, especially those handling sensitive user data or administrative functions, face increased risk. Additionally, the presence of unauthenticated exploitation means attackers can target any vulnerable site without needing credentials, increasing the attack surface. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's nature makes it a likely target for future attacks.
Mitigation Recommendations
To mitigate CVE-2024-4895, organizations should immediately update the wpDataTables plugin to a patched version once available. In the absence of an official patch, administrators should restrict or disable the CSV import functionality to prevent injection of malicious scripts. Implement strict input validation and sanitization on all imported CSV data, ensuring that any HTML or JavaScript content is neutralized before storage or rendering. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Monitor web server and application logs for unusual activity related to CSV imports or page views. Educate users and administrators about the risks of interacting with untrusted content on the site. Additionally, consider using web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the plugin. Regularly audit and scan WordPress installations for outdated plugins and known vulnerabilities. Finally, maintain backups and incident response plans to quickly recover from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-15T05:43:14.775Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b98b7ef31ef0b55709e
Added to database: 2/25/2026, 9:37:28 PM
Last enriched: 2/26/2026, 12:57:45 AM
Last updated: 2/26/2026, 9:41:57 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.