CVE-2024-5501: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in divisupreme Supreme Modules Lite – Divi Theme, Extra Theme and Divi Builder
CVE-2024-5501 is a stored cross-site scripting (XSS) vulnerability affecting the Supreme Modules Lite plugin for WordPress, including Divi Theme, Extra Theme, and Divi Builder up to version 2. 5. 51. The flaw arises from improper input sanitization and output escaping of the 'button_one_id' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires applying patches when available, restricting contributor permissions, and implementing additional input validation and output encoding. Organizations using these WordPress themes and plugins should prioritize addressing this issue to prevent exploitation. Countries with significant WordPress usage and active Divi theme deployments, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most at risk.
AI Analysis
Technical Summary
CVE-2024-5501 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the Supreme Modules Lite plugin used in Divi Theme, Extra Theme, and Divi Builder for WordPress. The vulnerability stems from insufficient sanitization and escaping of the 'button_one_id' parameter, which is processed during web page generation. Authenticated users with Contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. Because the malicious script is stored, it executes every time a user accesses the compromised page, potentially allowing attackers to steal session cookies, perform actions on behalf of other users, or conduct further attacks such as phishing or malware distribution. The vulnerability does not require user interaction beyond page access and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. No patches have been linked yet, and no known exploits are reported in the wild, but the presence of this vulnerability in popular WordPress themes and builders increases its risk profile. The vulnerability affects all versions up to and including 2.5.51 of the plugin. The flaw is particularly concerning because Contributor-level users are common in WordPress environments, and the injected scripts can impact any user visiting the infected pages.
Potential Impact
The impact of CVE-2024-5501 is significant for organizations using the affected WordPress themes and plugins. Successful exploitation can lead to session hijacking, unauthorized actions performed with the privileges of other users, and potential compromise of sensitive information. Since the vulnerability allows stored XSS, it can facilitate persistent attacks that affect multiple users, including administrators. This can undermine the integrity and confidentiality of the website and its users. The availability impact is low, as the vulnerability does not directly cause denial of service. However, reputational damage and loss of user trust can be substantial if attackers leverage this flaw for phishing or malware distribution. Organizations with multi-user WordPress environments, especially those allowing Contributor-level access to untrusted users, are at higher risk. The vulnerability's network attack vector and low complexity make it relatively easy to exploit once an attacker has the required privileges, increasing the threat surface. The scope change indicates that the impact can extend beyond the immediate plugin, potentially affecting the entire website and its visitors.
Mitigation Recommendations
1. Immediately restrict Contributor-level access to trusted users only, minimizing the risk of malicious script injection. 2. Monitor and audit user-generated content, especially inputs related to the 'button_one_id' parameter, for suspicious or unexpected scripts. 3. Apply input validation and output encoding at the application level to ensure all user inputs are properly sanitized and escaped before rendering. 4. Update the Supreme Modules Lite plugin, Divi Theme, Extra Theme, and Divi Builder to the latest versions once patches addressing CVE-2024-5501 are released by the vendor. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting WordPress plugins. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content policies. 7. Regularly scan WordPress sites with security tools to detect stored XSS and other vulnerabilities. 8. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. 9. Backup website data frequently to enable quick recovery if exploitation occurs.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, India, France, Netherlands, Brazil, Japan
CVE-2024-5501: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in divisupreme Supreme Modules Lite – Divi Theme, Extra Theme and Divi Builder
Description
CVE-2024-5501 is a stored cross-site scripting (XSS) vulnerability affecting the Supreme Modules Lite plugin for WordPress, including Divi Theme, Extra Theme, and Divi Builder up to version 2. 5. 51. The flaw arises from improper input sanitization and output escaping of the 'button_one_id' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires applying patches when available, restricting contributor permissions, and implementing additional input validation and output encoding. Organizations using these WordPress themes and plugins should prioritize addressing this issue to prevent exploitation. Countries with significant WordPress usage and active Divi theme deployments, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-5501 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the Supreme Modules Lite plugin used in Divi Theme, Extra Theme, and Divi Builder for WordPress. The vulnerability stems from insufficient sanitization and escaping of the 'button_one_id' parameter, which is processed during web page generation. Authenticated users with Contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. Because the malicious script is stored, it executes every time a user accesses the compromised page, potentially allowing attackers to steal session cookies, perform actions on behalf of other users, or conduct further attacks such as phishing or malware distribution. The vulnerability does not require user interaction beyond page access and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. No patches have been linked yet, and no known exploits are reported in the wild, but the presence of this vulnerability in popular WordPress themes and builders increases its risk profile. The vulnerability affects all versions up to and including 2.5.51 of the plugin. The flaw is particularly concerning because Contributor-level users are common in WordPress environments, and the injected scripts can impact any user visiting the infected pages.
Potential Impact
The impact of CVE-2024-5501 is significant for organizations using the affected WordPress themes and plugins. Successful exploitation can lead to session hijacking, unauthorized actions performed with the privileges of other users, and potential compromise of sensitive information. Since the vulnerability allows stored XSS, it can facilitate persistent attacks that affect multiple users, including administrators. This can undermine the integrity and confidentiality of the website and its users. The availability impact is low, as the vulnerability does not directly cause denial of service. However, reputational damage and loss of user trust can be substantial if attackers leverage this flaw for phishing or malware distribution. Organizations with multi-user WordPress environments, especially those allowing Contributor-level access to untrusted users, are at higher risk. The vulnerability's network attack vector and low complexity make it relatively easy to exploit once an attacker has the required privileges, increasing the threat surface. The scope change indicates that the impact can extend beyond the immediate plugin, potentially affecting the entire website and its visitors.
Mitigation Recommendations
1. Immediately restrict Contributor-level access to trusted users only, minimizing the risk of malicious script injection. 2. Monitor and audit user-generated content, especially inputs related to the 'button_one_id' parameter, for suspicious or unexpected scripts. 3. Apply input validation and output encoding at the application level to ensure all user inputs are properly sanitized and escaped before rendering. 4. Update the Supreme Modules Lite plugin, Divi Theme, Extra Theme, and Divi Builder to the latest versions once patches addressing CVE-2024-5501 are released by the vendor. 5. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting WordPress plugins. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content policies. 7. Regularly scan WordPress sites with security tools to detect stored XSS and other vulnerabilities. 8. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. 9. Backup website data frequently to enable quick recovery if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-29T20:43:30.479Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6be9b7ef31ef0b55c0ff
Added to database: 2/25/2026, 9:38:49 PM
Last enriched: 2/26/2026, 2:37:19 AM
Last updated: 2/26/2026, 11:22:13 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.