Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54436: Cross-Site Request Forgery (CSRF) in milordk Jet Footer Code

0
Unknown
VulnerabilityCVE-2024-54436cvecve-2024-54436
Published: Mon Dec 16 2024 (12/16/2024, 14:13:42 UTC)
Source: CVE Database V5
Vendor/Project: milordk
Product: Jet Footer Code

Description

Cross-Site Request Forgery (CSRF) vulnerability in milordk Jet Footer Code jet-footer-code allows Stored XSS.This issue affects Jet Footer Code: from n/a through <= 1.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 09:36:35 UTC

Technical Analysis

CVE-2024-54436 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the milordk Jet Footer Code plugin, specifically affecting versions up to 1.4. The vulnerability enables an attacker to craft malicious requests that, when executed by an authenticated user, result in the injection of stored malicious scripts into the website's footer section. This stored XSS can then be used to execute arbitrary JavaScript in the context of the victim's browser, potentially stealing session cookies, performing actions on behalf of the user, or redirecting users to malicious sites. The root cause is the lack of proper CSRF protections such as nonce validation or token verification in the plugin's request handling. Since the vulnerability allows stored XSS, the impact extends beyond a single request and can affect all visitors to the compromised site. The plugin is commonly used in WordPress environments to customize footer content, making it a target for attackers seeking to leverage trusted sites for broader attacks. No CVSS score has been assigned yet, and no patches or exploits are currently publicly available, but the vulnerability is confirmed and published as of December 2024.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to inject persistent malicious scripts into websites using the Jet Footer Code plugin, compromising the confidentiality and integrity of user sessions and data. This can lead to session hijacking, credential theft, defacement, or distribution of malware to site visitors. Organizations running affected versions risk reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. Since the vulnerability exploits CSRF to achieve stored XSS, it can affect any authenticated user with sufficient privileges to modify footer code, potentially including site administrators. The widespread use of WordPress and the plugin in various sectors increases the attack surface globally. Although no active exploitation is reported, the ease of exploitation and the persistent nature of stored XSS make this a high-risk vulnerability if left unmitigated.

Mitigation Recommendations

Organizations should immediately verify if they are using the milordk Jet Footer Code plugin version 1.4 or earlier and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict access to footer code editing to trusted users only and implement Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin's endpoints. Employing security headers such as Content Security Policy (CSP) can help mitigate the impact of stored XSS by restricting script execution sources. Additionally, site owners should monitor logs for unusual POST requests and audit footer code changes for unauthorized modifications. Educating users about phishing and social engineering risks can reduce the likelihood of successful CSRF attacks. Finally, plugin developers and maintainers should implement proper CSRF tokens and nonce validation in all state-changing requests to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-12-02T14:02:37.548Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75ade6bfc5ba1df06d46

Added to database: 4/1/2026, 7:44:45 PM

Last enriched: 4/2/2026, 9:36:35 AM

Last updated: 4/4/2026, 8:16:22 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses