Skip to main content

CVE-2024-6335: CWE-79 Cross-Site Scripting (XSS) in Unknown Tracking Code Manager

Medium
VulnerabilityCVE-2024-6335cvecve-2024-6335cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:06 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Tracking Code Manager

Description

The Tracking Code Manager WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 07:56:08 UTC

Technical Analysis

CVE-2024-6335 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the WordPress plugin 'Tracking Code Manager' prior to version 2.3.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts (Stored XSS) within the plugin's settings. Notably, this exploit is possible even when the WordPress capability 'unfiltered_html' is disabled, which is commonly the case in multisite WordPress installations to restrict HTML input. The vulnerability requires high privilege (admin) access and some user interaction (e.g., visiting a crafted page) to trigger the malicious script execution. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, with low attack complexity, but requiring privileges and user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the WordPress site. The impact includes limited confidentiality and integrity loss, with no direct availability impact. Although no known exploits are reported in the wild, the vulnerability poses a risk in environments where multiple admins or trusted users exist, as a malicious admin could leverage this to execute arbitrary JavaScript in the context of other admins or users, potentially leading to session hijacking, privilege escalation, or further compromise of the site. Since the plugin is used to manage tracking codes, which often interact with external analytics or marketing services, exploitation could also lead to injection of malicious scripts affecting site visitors or data leakage. No official patches or fixes are linked yet, so affected users should monitor for updates or consider temporary mitigations.

Potential Impact

For European organizations using WordPress sites with the Tracking Code Manager plugin, this vulnerability can lead to unauthorized script execution within the administrative interface, risking the confidentiality and integrity of site data and user sessions. In multisite WordPress deployments common in enterprise or educational institutions, the risk is heightened because the vulnerability bypasses the usual 'unfiltered_html' restriction. Attackers with admin privileges could inject malicious JavaScript that steals credentials, manipulates site content, or spreads malware to site visitors. This could result in reputational damage, data breaches involving personal data protected under GDPR, and potential regulatory penalties. Additionally, if the injected scripts target visitors, it could lead to broader customer impact and loss of trust. The medium severity score suggests the threat is moderate but should not be underestimated, especially in sectors with high compliance requirements or sensitive data, such as finance, healthcare, and government agencies in Europe.

Mitigation Recommendations

1. Immediate mitigation involves restricting admin access to trusted personnel only and auditing existing admin accounts for suspicious activity. 2. Disable or limit the use of the Tracking Code Manager plugin until a patch is available. 3. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 4. Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. 5. Use Web Application Firewalls (WAF) with rules to detect and block common XSS payloads targeting WordPress admin pages. 6. Once a patch or updated plugin version is released, promptly apply the update. 7. Educate administrators about the risks of stored XSS and safe handling of plugin settings. 8. Consider isolating administrative interfaces behind VPNs or IP whitelisting to reduce exposure. 9. Regularly backup WordPress sites and databases to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-06-25T20:15:10.198Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec255

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:56:08 AM

Last updated: 8/10/2025, 10:40:12 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats