Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5901: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gpriday SiteOrigin Widgets Bundle

0
Medium
VulnerabilityCVE-2024-5901cvecve-2024-5901cwe-79
Published: Tue Jul 30 2024 (07/30/2024, 20:30:04 UTC)
Source: CVE Database V5
Vendor/Project: gpriday
Product: SiteOrigin Widgets Bundle

Description

CVE-2024-5901 is a stored cross-site scripting (XSS) vulnerability in the SiteOrigin Widgets Bundle WordPress plugin, specifically in the Image Grid widget. It affects all versions up to and including 1. 62. 2. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction but does require authentication with limited privileges. The CVSS score is 6. 4 (medium severity), reflecting the potential for confidentiality and integrity impacts but no direct availability impact. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:54:49 UTC

Technical Analysis

CVE-2024-5901 is a stored cross-site scripting (XSS) vulnerability identified in the SiteOrigin Widgets Bundle plugin for WordPress, specifically within the Image Grid widget. This vulnerability exists due to improper neutralization of input during web page generation, classified under CWE-79. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages. These scripts are stored persistently and executed whenever any user accesses the affected page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim's browser session. The vulnerability affects all versions up to and including 1.62.2 of the plugin. The CVSS v3.1 base score is 6.4, indicating a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges (contributor or higher), no user interaction, and impacts confidentiality and integrity with a changed scope. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those that allow contributor-level users to add or edit content. The vulnerability is notable because contributor roles are common in multi-author WordPress sites, and the stored nature of the XSS can affect all visitors to the compromised page. The lack of patch links suggests a patch may not yet be available or publicly announced, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-5901 is significant for organizations running WordPress sites with the SiteOrigin Widgets Bundle plugin installed, particularly versions up to 1.62.2. Since the vulnerability allows stored XSS, attackers with contributor-level access can inject malicious scripts that execute in the browsers of any users visiting the compromised pages. This can lead to theft of session cookies, enabling account takeover or privilege escalation, unauthorized actions performed on behalf of users, defacement, or distribution of malware. The confidentiality and integrity of user data and site content can be compromised. While availability is not directly impacted, the reputational damage and potential for further exploitation (such as pivoting to more severe attacks) can be substantial. Organizations with multi-author blogs or community sites where contributor roles are common are at higher risk. The vulnerability can also facilitate lateral movement within the site or network if attackers leverage stolen credentials or session tokens. Given the widespread use of WordPress globally, the potential attack surface is large, affecting small businesses, enterprises, and public sector websites alike.

Mitigation Recommendations

To mitigate CVE-2024-5901, organizations should immediately assess their WordPress installations for the presence of the SiteOrigin Widgets Bundle plugin and determine the version in use. If an updated patched version is available, apply it promptly. In the absence of an official patch, consider temporarily disabling or removing the vulnerable Image Grid widget or the entire plugin to prevent exploitation. Restrict contributor-level permissions by reviewing user roles and limiting the ability to add or edit content to trusted users only. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the affected plugin. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts. Conduct regular security audits and scanning for malicious scripts or injected content on pages using the Image Grid widget. Educate site administrators and contributors about the risks of XSS and safe content practices. Monitor site logs for suspicious activity indicative of exploitation attempts. Finally, maintain a robust backup and incident response plan to recover quickly if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-12T10:41:31.129Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d118

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:54:49 AM

Last updated: 2/26/2026, 11:39:05 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats