CVE-2024-6693: CWE-79 Cross-Site Scripting (XSS) in Unknown wccp-pro
The wccp-pro WordPress plugin before 15.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2024-6693 is a medium-severity vulnerability classified as a Stored Cross-Site Scripting (XSS) issue affecting the wccp-pro WordPress plugin versions prior to 15.3. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress setups to restrict HTML input. The CVSS 3.1 base score is 4.8, indicating a medium severity level. The attack vector is network-based (remote), requiring high privileges (admin-level access) and user interaction (e.g., visiting a page with the injected script). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. There are no known exploits in the wild, and no official patches or updates have been linked yet. The vulnerability is identified under CWE-79, which is a common web application security weakness related to improper input validation and output encoding leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the wccp-pro plugin, this vulnerability poses a risk primarily to administrative users and the integrity of site content. An attacker with admin privileges could inject malicious JavaScript that executes in the context of other administrators or users with elevated rights, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of legitimate users. While the vulnerability requires high privileges to exploit, it can undermine trust in the affected websites, lead to data leakage of sensitive information accessible to admins, and facilitate further attacks within the network. In multisite WordPress environments common in European enterprises and institutions, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. This could impact sectors such as government, education, and businesses relying on WordPress multisite deployments. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely used CMS infrastructure means it could be targeted in the future, especially in politically or economically sensitive regions in Europe.
Mitigation Recommendations
1. Immediate mitigation involves upgrading the wccp-pro plugin to version 15.3 or later once available, as this will include the necessary sanitization and escaping fixes. 2. Until an update is released, restrict admin access strictly to trusted personnel and audit admin accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting plugin settings pages. 4. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. 5. Regularly monitor WordPress logs and plugin settings changes for anomalous behavior. 6. For multisite setups, consider additional plugin hardening or isolation measures to limit cross-site contamination. 7. Educate administrators on the risks of stored XSS and safe handling of plugin settings inputs. 8. Conduct security reviews and penetration testing focused on plugin configurations to identify any residual injection points.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2024-6693: CWE-79 Cross-Site Scripting (XSS) in Unknown wccp-pro
Description
The wccp-pro WordPress plugin before 15.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2024-6693 is a medium-severity vulnerability classified as a Stored Cross-Site Scripting (XSS) issue affecting the wccp-pro WordPress plugin versions prior to 15.3. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress setups to restrict HTML input. The CVSS 3.1 base score is 4.8, indicating a medium severity level. The attack vector is network-based (remote), requiring high privileges (admin-level access) and user interaction (e.g., visiting a page with the injected script). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent but does not affect availability. There are no known exploits in the wild, and no official patches or updates have been linked yet. The vulnerability is identified under CWE-79, which is a common web application security weakness related to improper input validation and output encoding leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the wccp-pro plugin, this vulnerability poses a risk primarily to administrative users and the integrity of site content. An attacker with admin privileges could inject malicious JavaScript that executes in the context of other administrators or users with elevated rights, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of legitimate users. While the vulnerability requires high privileges to exploit, it can undermine trust in the affected websites, lead to data leakage of sensitive information accessible to admins, and facilitate further attacks within the network. In multisite WordPress environments common in European enterprises and institutions, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. This could impact sectors such as government, education, and businesses relying on WordPress multisite deployments. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely used CMS infrastructure means it could be targeted in the future, especially in politically or economically sensitive regions in Europe.
Mitigation Recommendations
1. Immediate mitigation involves upgrading the wccp-pro plugin to version 15.3 or later once available, as this will include the necessary sanitization and escaping fixes. 2. Until an update is released, restrict admin access strictly to trusted personnel and audit admin accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting plugin settings pages. 4. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. 5. Regularly monitor WordPress logs and plugin settings changes for anomalous behavior. 6. For multisite setups, consider additional plugin hardening or isolation measures to limit cross-site contamination. 7. Educate administrators on the risks of stored XSS and safe handling of plugin settings inputs. 8. Conduct security reviews and penetration testing focused on plugin configurations to identify any residual injection points.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-07-11T15:00:44.001Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec261
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:57:31 AM
Last updated: 8/12/2025, 4:32:19 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.