Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5254: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery

0
Medium
VulnerabilityCVE-2024-5254cvecve-2024-5254cwe-79
Published: Wed Jul 17 2024 (07/17/2024, 06:45:08 UTC)
Source: CVE Database V5
Vendor/Project: Brainstorm Force
Product: Ultimate Addons for WPBakery

Description

CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Addons for WPBakery WordPress plugin, affecting all versions up to 3. 19. 20. It arises from improper input sanitization and output escaping in the ultimate_info_banner shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:29:24 UTC

Technical Analysis

CVE-2024-5254 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Addons for WPBakery plugin for WordPress, maintained by Brainstorm Force. The flaw exists in the ultimate_info_banner shortcode, which fails to properly sanitize and escape user-supplied attributes before rendering them on web pages. This improper neutralization of input (classified under CWE-79) allows an attacker with at least contributor-level privileges to inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently, it executes automatically whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data theft. The vulnerability affects all plugin versions up to and including 3.19.20. Exploitation requires authenticated access but no additional user interaction. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk. The issue highlights the importance of rigorous input validation and output encoding in web application components, especially those that accept user-generated content.

Potential Impact

The impact of CVE-2024-5254 is primarily on the confidentiality and integrity of affected WordPress sites and their users. An attacker exploiting this vulnerability can execute arbitrary JavaScript in the context of the vulnerable site, potentially leading to session hijacking, theft of sensitive information such as cookies or credentials, defacement of website content, or redirection to malicious sites. Because the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the compromised page, increasing the attack surface. Organizations relying on the Ultimate Addons for WPBakery plugin risk reputational damage, loss of user trust, and potential regulatory consequences if user data is exposed. Although availability is not directly impacted, secondary effects such as site defacement or injection of malware could disrupt normal operations. The requirement for contributor-level access limits exploitation to insiders or compromised accounts, but given the commonality of such roles in WordPress environments, the risk remains significant. The vulnerability's scope includes all sites using the affected plugin versions, which are widely deployed globally, especially in small to medium businesses and content-driven websites.

Mitigation Recommendations

To mitigate CVE-2024-5254, organizations should immediately update the Ultimate Addons for WPBakery plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict contributor-level and higher privileges to trusted users only and audit existing user roles for unnecessary permissions. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injection patterns in shortcode parameters can provide temporary protection. Additionally, site owners should review and sanitize all existing content created via the ultimate_info_banner shortcode to remove any injected scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regular security audits and monitoring for unusual user activity or content changes are recommended. Finally, educating content contributors about safe input practices and the risks of injecting untrusted data can reduce accidental exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-22T21:51:09.164Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6be2b7ef31ef0b55bc32

Added to database: 2/25/2026, 9:38:42 PM

Last enriched: 2/26/2026, 2:29:24 AM

Last updated: 2/26/2026, 9:41:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats