Skip to main content

CVE-2024-6693: CWE-79 Cross-Site Scripting (XSS) in Unknown wccp-pro

Medium
VulnerabilityCVE-2024-6693cvecve-2024-6693cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:08 UTC)
Source: CVE
Vendor/Project: Unknown
Product: wccp-pro

Description

The wccp-pro WordPress plugin before 15.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 07:57:31 UTC

Technical Analysis

CVE-2024-6693 is a medium-severity vulnerability classified as a Stored Cross-Site Scripting (XSS) issue affecting the wccp-pro WordPress plugin versions prior to 15.3. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress setups to restrict HTML input. The CVSS 3.1 base score is 4.8, indicating a medium severity level. The attack vector is network-based (remote), requiring high privileges (admin-level access) and user interaction (e.g., visiting a page with the injected script). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. There are no known exploits in the wild, and no official patches or updates have been linked yet. The vulnerability is identified under CWE-79, which is a common web application security weakness related to improper input validation and output encoding leading to XSS attacks.

Potential Impact

For European organizations using WordPress sites with the wccp-pro plugin, this vulnerability poses a risk primarily to administrative users and the integrity of site content. An attacker with admin privileges could inject malicious JavaScript that executes in the context of other administrators or users with elevated rights, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of legitimate users. While the vulnerability requires high privileges to exploit, it can undermine trust in the affected websites, lead to data leakage of sensitive information accessible to admins, and facilitate further attacks within the network. In multisite WordPress environments common in European enterprises and institutions, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. This could impact sectors such as government, education, and businesses relying on WordPress multisite deployments. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely used CMS infrastructure means it could be targeted in the future, especially in politically or economically sensitive regions in Europe.

Mitigation Recommendations

1. Immediate mitigation involves upgrading the wccp-pro plugin to version 15.3 or later once available, as this will include the necessary sanitization and escaping fixes. 2. Until an update is released, restrict admin access strictly to trusted personnel and audit admin accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting plugin settings pages. 4. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. 5. Regularly monitor WordPress logs and plugin settings changes for anomalous behavior. 6. For multisite setups, consider additional plugin hardening or isolation measures to limit cross-site contamination. 7. Educate administrators on the risks of stored XSS and safe handling of plugin settings inputs. 8. Conduct security reviews and penetration testing focused on plugin configurations to identify any residual injection points.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-11T15:00:44.001Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec261

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:57:31 AM

Last updated: 8/12/2025, 4:32:19 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats