CVE-2024-6462: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Yandex Metrika
The DL Yandex Metrika WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2024-6462 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting or XSS) affecting the DL Yandex Metrika WordPress plugin up to version 1.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains exploitable even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The vulnerability requires high privileges (admin level) and user interaction (an admin must save malicious content), but once exploited, it can lead to stored XSS attacks that execute arbitrary JavaScript in the context of other administrators or users viewing the affected settings pages. The CVSS 3.1 base score is 4.8, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity by enabling script execution that could steal session tokens, modify settings, or perform actions on behalf of administrators. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 15, 2025, and was assigned by WPScan. The affected product is a WordPress plugin related to Yandex Metrika, a web analytics service popular in Russian-speaking and some European markets.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the DL Yandex Metrika WordPress plugin. Exploitation could allow attackers with administrative access to inject malicious scripts that compromise site integrity and confidentiality. This could lead to unauthorized actions within the WordPress admin interface, data leakage, or pivoting to other internal systems if combined with other vulnerabilities. Organizations relying on WordPress multisite setups are particularly at risk since the vulnerability bypasses the unfiltered_html capability restriction. Given the plugin's association with Yandex Metrika, which is used for web analytics, organizations using this plugin for tracking and analytics could face data integrity issues or manipulation of analytics data. While the vulnerability requires admin-level privileges, insider threats or compromised admin accounts could be leveraged to exploit this flaw. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation by privileged users warrant prompt attention. The impact on availability is minimal, but confidentiality and integrity risks could affect trustworthiness of web assets and user data.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and auditing existing admin accounts for suspicious activity. 2. Disable or remove the DL Yandex Metrika plugin if it is not essential to reduce attack surface. 3. Monitor plugin updates closely and apply patches as soon as they become available from the vendor or WordPress plugin repository. 4. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 5. Use Web Application Firewalls (WAFs) with rules to detect and block suspicious input patterns related to stored XSS in plugin settings. 6. Conduct regular security reviews and penetration testing focusing on WordPress plugins and multisite configurations. 7. Educate administrators on the risks of injecting untrusted content into plugin settings and enforce strict input validation policies. 8. Consider isolating analytics plugins in separate environments or subdomains to contain potential compromise.
Affected Countries
Russia, Ukraine, Belarus, Germany, France, Poland, United Kingdom, Netherlands
CVE-2024-6462: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Yandex Metrika
Description
The DL Yandex Metrika WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2024-6462 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting or XSS) affecting the DL Yandex Metrika WordPress plugin up to version 1.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains exploitable even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The vulnerability requires high privileges (admin level) and user interaction (an admin must save malicious content), but once exploited, it can lead to stored XSS attacks that execute arbitrary JavaScript in the context of other administrators or users viewing the affected settings pages. The CVSS 3.1 base score is 4.8, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily affects confidentiality and integrity by enabling script execution that could steal session tokens, modify settings, or perform actions on behalf of administrators. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 15, 2025, and was assigned by WPScan. The affected product is a WordPress plugin related to Yandex Metrika, a web analytics service popular in Russian-speaking and some European markets.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the DL Yandex Metrika WordPress plugin. Exploitation could allow attackers with administrative access to inject malicious scripts that compromise site integrity and confidentiality. This could lead to unauthorized actions within the WordPress admin interface, data leakage, or pivoting to other internal systems if combined with other vulnerabilities. Organizations relying on WordPress multisite setups are particularly at risk since the vulnerability bypasses the unfiltered_html capability restriction. Given the plugin's association with Yandex Metrika, which is used for web analytics, organizations using this plugin for tracking and analytics could face data integrity issues or manipulation of analytics data. While the vulnerability requires admin-level privileges, insider threats or compromised admin accounts could be leveraged to exploit this flaw. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation by privileged users warrant prompt attention. The impact on availability is minimal, but confidentiality and integrity risks could affect trustworthiness of web assets and user data.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and auditing existing admin accounts for suspicious activity. 2. Disable or remove the DL Yandex Metrika plugin if it is not essential to reduce attack surface. 3. Monitor plugin updates closely and apply patches as soon as they become available from the vendor or WordPress plugin repository. 4. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 5. Use Web Application Firewalls (WAFs) with rules to detect and block suspicious input patterns related to stored XSS in plugin settings. 6. Conduct regular security reviews and penetration testing focusing on WordPress plugins and multisite configurations. 7. Educate administrators on the risks of injecting untrusted content into plugin settings and enforce strict input validation policies. 8. Consider isolating analytics plugins in separate environments or subdomains to contain potential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-07-02T20:57:28.043Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec257
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:56:23 AM
Last updated: 7/31/2025, 9:47:07 AM
Views: 12
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.