CVE-2024-5902: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds
CVE-2024-5902 is a high-severity stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' by smub. The flaw exists due to improper input sanitization and output escaping of the 'name' parameter in feedback form responses, allowing unauthenticated attackers to inject malicious scripts. These scripts execute when a high-privileged user views the feedback, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability affects all versions up to and including 1. 0. 15. Exploitation requires no authentication or user interaction, and the vulnerability has a CVSS score of 7. 2, indicating high severity. No public exploits are currently known. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent compromise of administrative accounts.
AI Analysis
Technical Summary
CVE-2024-5902 is a stored cross-site scripting vulnerability classified under CWE-79 that affects the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' developed by smub. The vulnerability arises from insufficient sanitization and escaping of the 'name' parameter within feedback form responses. An unauthenticated attacker can submit crafted input containing malicious JavaScript code into the feedback forms. When a high-privileged user, such as an administrator, views these responses in the WordPress dashboard, the malicious script executes in their browser context. This can lead to theft of authentication cookies, session tokens, or execution of arbitrary actions with the victim's privileges. The vulnerability affects all versions up to 1.0.15, with no available patches at the time of disclosure. The CVSS v3.1 score is 7.2 (High), reflecting network attack vector, no required privileges or user interaction, and a scope change due to potential compromise of administrative accounts. Although no known exploits are in the wild, the ease of exploitation and the high privileges targeted make this a significant threat to WordPress sites using this plugin. The vulnerability highlights the critical need for proper input validation and output encoding in web applications, especially those handling user-generated content.
Potential Impact
The impact of CVE-2024-5902 is significant for organizations using the affected WordPress plugin. Successful exploitation allows unauthenticated attackers to execute arbitrary scripts in the context of high-privileged users, typically site administrators. This can lead to credential theft, session hijacking, unauthorized administrative actions, and potential full site compromise. The compromise of administrative accounts can further enable attackers to install backdoors, modify site content, or pivot to other internal systems. Since WordPress powers a large portion of websites globally, including e-commerce, government, and enterprise sites, the vulnerability poses a broad risk. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations that do not promptly address this vulnerability risk data breaches, reputational damage, and operational disruption.
Mitigation Recommendations
To mitigate CVE-2024-5902, organizations should immediately update the 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'name' parameter can provide temporary protection. Administrators should also review and sanitize existing feedback entries to remove any injected scripts. Enforcing the principle of least privilege by limiting administrative access and using multi-factor authentication can reduce the impact of potential exploitation. Regular security audits and monitoring for unusual administrative activity are recommended. Finally, educating site administrators about the risks of XSS and safe handling of user-generated content can help prevent exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-5902: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds
Description
CVE-2024-5902 is a high-severity stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' by smub. The flaw exists due to improper input sanitization and output escaping of the 'name' parameter in feedback form responses, allowing unauthenticated attackers to inject malicious scripts. These scripts execute when a high-privileged user views the feedback, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability affects all versions up to and including 1. 0. 15. Exploitation requires no authentication or user interaction, and the vulnerability has a CVSS score of 7. 2, indicating high severity. No public exploits are currently known. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent compromise of administrative accounts.
AI-Powered Analysis
Technical Analysis
CVE-2024-5902 is a stored cross-site scripting vulnerability classified under CWE-79 that affects the WordPress plugin 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' developed by smub. The vulnerability arises from insufficient sanitization and escaping of the 'name' parameter within feedback form responses. An unauthenticated attacker can submit crafted input containing malicious JavaScript code into the feedback forms. When a high-privileged user, such as an administrator, views these responses in the WordPress dashboard, the malicious script executes in their browser context. This can lead to theft of authentication cookies, session tokens, or execution of arbitrary actions with the victim's privileges. The vulnerability affects all versions up to 1.0.15, with no available patches at the time of disclosure. The CVSS v3.1 score is 7.2 (High), reflecting network attack vector, no required privileges or user interaction, and a scope change due to potential compromise of administrative accounts. Although no known exploits are in the wild, the ease of exploitation and the high privileges targeted make this a significant threat to WordPress sites using this plugin. The vulnerability highlights the critical need for proper input validation and output encoding in web applications, especially those handling user-generated content.
Potential Impact
The impact of CVE-2024-5902 is significant for organizations using the affected WordPress plugin. Successful exploitation allows unauthenticated attackers to execute arbitrary scripts in the context of high-privileged users, typically site administrators. This can lead to credential theft, session hijacking, unauthorized administrative actions, and potential full site compromise. The compromise of administrative accounts can further enable attackers to install backdoors, modify site content, or pivot to other internal systems. Since WordPress powers a large portion of websites globally, including e-commerce, government, and enterprise sites, the vulnerability poses a broad risk. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations that do not promptly address this vulnerability risk data breaches, reputational damage, and operational disruption.
Mitigation Recommendations
To mitigate CVE-2024-5902, organizations should immediately update the 'User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds' plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'name' parameter can provide temporary protection. Administrators should also review and sanitize existing feedback entries to remove any injected scripts. Enforcing the principle of least privilege by limiting administrative access and using multi-factor authentication can reduce the impact of potential exploitation. Regular security audits and monitoring for unusual administrative activity are recommended. Finally, educating site administrators about the risks of XSS and safe handling of user-generated content can help prevent exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-12T13:42:59.864Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bf6b7ef31ef0b55d11d
Added to database: 2/25/2026, 9:39:02 PM
Last enriched: 2/26/2026, 2:55:04 AM
Last updated: 2/26/2026, 11:19:32 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.