CVE-2024-5254: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Addons for WPBakery WordPress plugin, affecting all versions up to 3. 19. 20. It arises from improper input sanitization and output escaping in the ultimate_info_banner shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Addons for WPBakery plugin for WordPress, maintained by Brainstorm Force. The flaw exists in the ultimate_info_banner shortcode, which fails to properly sanitize and escape user-supplied attributes before rendering them on web pages. This improper neutralization of input (classified under CWE-79) allows an attacker with at least contributor-level privileges to inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently, it executes automatically whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data theft. The vulnerability affects all plugin versions up to and including 3.19.20. Exploitation requires authenticated access but no additional user interaction. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk. The issue highlights the importance of rigorous input validation and output encoding in web application components, especially those that accept user-generated content.
Potential Impact
The impact of CVE-2024-5254 is primarily on the confidentiality and integrity of affected WordPress sites and their users. An attacker exploiting this vulnerability can execute arbitrary JavaScript in the context of the vulnerable site, potentially leading to session hijacking, theft of sensitive information such as cookies or credentials, defacement of website content, or redirection to malicious sites. Because the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the compromised page, increasing the attack surface. Organizations relying on the Ultimate Addons for WPBakery plugin risk reputational damage, loss of user trust, and potential regulatory consequences if user data is exposed. Although availability is not directly impacted, secondary effects such as site defacement or injection of malware could disrupt normal operations. The requirement for contributor-level access limits exploitation to insiders or compromised accounts, but given the commonality of such roles in WordPress environments, the risk remains significant. The vulnerability's scope includes all sites using the affected plugin versions, which are widely deployed globally, especially in small to medium businesses and content-driven websites.
Mitigation Recommendations
To mitigate CVE-2024-5254, organizations should immediately update the Ultimate Addons for WPBakery plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict contributor-level and higher privileges to trusted users only and audit existing user roles for unnecessary permissions. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injection patterns in shortcode parameters can provide temporary protection. Additionally, site owners should review and sanitize all existing content created via the ultimate_info_banner shortcode to remove any injected scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regular security audits and monitoring for unusual user activity or content changes are recommended. Finally, educating content contributors about safe input practices and the risks of injecting untrusted data can reduce accidental exploitation.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, Brazil, France, Netherlands, Japan, Italy, Spain
CVE-2024-5254: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
Description
CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Addons for WPBakery WordPress plugin, affecting all versions up to 3. 19. 20. It arises from improper input sanitization and output escaping in the ultimate_info_banner shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Addons for WPBakery plugin for WordPress, maintained by Brainstorm Force. The flaw exists in the ultimate_info_banner shortcode, which fails to properly sanitize and escape user-supplied attributes before rendering them on web pages. This improper neutralization of input (classified under CWE-79) allows an attacker with at least contributor-level privileges to inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently, it executes automatically whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data theft. The vulnerability affects all plugin versions up to and including 3.19.20. Exploitation requires authenticated access but no additional user interaction. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk. The issue highlights the importance of rigorous input validation and output encoding in web application components, especially those that accept user-generated content.
Potential Impact
The impact of CVE-2024-5254 is primarily on the confidentiality and integrity of affected WordPress sites and their users. An attacker exploiting this vulnerability can execute arbitrary JavaScript in the context of the vulnerable site, potentially leading to session hijacking, theft of sensitive information such as cookies or credentials, defacement of website content, or redirection to malicious sites. Because the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the compromised page, increasing the attack surface. Organizations relying on the Ultimate Addons for WPBakery plugin risk reputational damage, loss of user trust, and potential regulatory consequences if user data is exposed. Although availability is not directly impacted, secondary effects such as site defacement or injection of malware could disrupt normal operations. The requirement for contributor-level access limits exploitation to insiders or compromised accounts, but given the commonality of such roles in WordPress environments, the risk remains significant. The vulnerability's scope includes all sites using the affected plugin versions, which are widely deployed globally, especially in small to medium businesses and content-driven websites.
Mitigation Recommendations
To mitigate CVE-2024-5254, organizations should immediately update the Ultimate Addons for WPBakery plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict contributor-level and higher privileges to trusted users only and audit existing user roles for unnecessary permissions. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injection patterns in shortcode parameters can provide temporary protection. Additionally, site owners should review and sanitize all existing content created via the ultimate_info_banner shortcode to remove any injected scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regular security audits and monitoring for unusual user activity or content changes are recommended. Finally, educating content contributors about safe input practices and the risks of injecting untrusted data can reduce accidental exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-22T21:51:09.164Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6be2b7ef31ef0b55bc32
Added to database: 2/25/2026, 9:38:42 PM
Last enriched: 2/26/2026, 2:29:24 AM
Last updated: 2/26/2026, 9:41:44 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.