Skip to main content

CVE-2024-6665: CWE-79 Cross-Site Scripting (XSS) in Unknown KBucket: Your Curated Content in WordPress

Medium
VulnerabilityCVE-2024-6665cvecve-2024-6665cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:08 UTC)
Source: CVE
Vendor/Project: Unknown
Product: KBucket: Your Curated Content in WordPress

Description

The KBucket: Your Curated Content in WordPress plugin before 4.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 15:26:40 UTC

Technical Analysis

CVE-2024-6665 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'KBucket: Your Curated Content' in versions prior to 4.1.6. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and limited impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The scope change means the vulnerability affects components beyond the initially vulnerable component. Although no known exploits are reported in the wild, the vulnerability could allow an attacker with admin privileges to execute arbitrary JavaScript in the context of the affected WordPress site, potentially leading to session hijacking, privilege escalation, or further attacks on site visitors or administrators. The lack of patch links suggests that a fix may not yet be publicly available or is pending release. Given that WordPress powers a significant portion of websites globally, and that this plugin is used for curated content, the vulnerability could be leveraged in targeted attacks against sites using this plugin, especially in multisite setups where unfiltered_html is disabled but this vulnerability bypasses that protection.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites and web applications running WordPress with the KBucket plugin installed, especially those using multisite configurations common in enterprise or educational environments. Successful exploitation could lead to the execution of malicious scripts by administrators, potentially allowing attackers to steal credentials, manipulate site content, or pivot to other internal systems. This could result in reputational damage, data breaches involving personal data protected under GDPR, and disruption of online services. Since the vulnerability requires high privileges and user interaction, the risk is somewhat mitigated but remains significant in environments where multiple administrators manage content. Attackers could also use social engineering to trick admins into triggering the exploit. The medium CVSS score reflects moderate risk, but the potential for scope change and the ability to bypass typical HTML filtering controls increase the threat level. Organizations relying on WordPress for customer-facing or internal portals should consider this vulnerability seriously, as exploitation could undermine trust and compliance with European data protection regulations.

Mitigation Recommendations

1. Immediate mitigation should include restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Monitor and audit admin activities and plugin settings for suspicious changes or injected scripts. 3. Disable or remove the KBucket plugin if it is not essential or if an updated patched version is not yet available. 4. If the plugin is necessary, closely follow vendor announcements and apply patches promptly once released. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings. 6. Educate administrators about the risks of social engineering attacks that could lead to exploitation. 7. For multisite WordPress installations, review and harden capability assignments to minimize the number of users with high privileges. 8. Regularly back up site data and configurations to enable recovery in case of compromise. These steps go beyond generic advice by focusing on administrative controls, monitoring, and proactive plugin management tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-10T17:56:30.224Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb8c8

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:26:40 PM

Last updated: 8/16/2025, 3:05:33 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats