Skip to main content

CVE-2024-6713: CWE-79 Cross-Site Scripting (XSS) in Unknown PVN Auth Popup

Medium
VulnerabilityCVE-2024-6713cvecve-2024-6713cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:09 UTC)
Source: CVE
Vendor/Project: Unknown
Product: PVN Auth Popup

Description

The PVN Auth Popup WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/04/2025, 07:58:10 UTC

Technical Analysis

CVE-2024-6713 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the PVN Auth Popup WordPress plugin up to version 1.0.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains exploitable even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restrict script injection. The vulnerability requires high privilege (admin) access and user interaction (e.g., an admin saving malicious settings) to trigger. The stored XSS can lead to the execution of arbitrary JavaScript in the context of other administrators or users with elevated privileges, potentially allowing session hijacking, privilege escalation, or further compromise of the WordPress installation. The CVSS 3.1 base score is 4.8, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction necessary. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability affects the PVN Auth Popup plugin, which is a third-party WordPress plugin of unknown vendor origin, limiting visibility into its distribution and usage scope.

Potential Impact

For European organizations using WordPress, especially those employing the PVN Auth Popup plugin, this vulnerability poses a risk of stored XSS attacks that could compromise administrative accounts and site integrity. Given that WordPress is widely used across Europe for corporate websites, e-commerce, and intranets, exploitation could lead to unauthorized access to sensitive data, defacement, or further malware deployment. Multisite WordPress setups, common in larger organizations and agencies, are particularly vulnerable since the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation here. The impact on confidentiality and integrity is moderate, as attackers could hijack admin sessions or inject malicious scripts to manipulate site content or steal credentials. Availability impact is minimal as the vulnerability does not directly cause denial of service. However, reputational damage and compliance risks (e.g., GDPR) could be significant if customer or user data is compromised. The requirement for high privileges limits the attack surface to insiders or compromised admin accounts, but insider threats or phishing attacks could facilitate exploitation.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the PVN Auth Popup plugin. If found, restrict administrative access to trusted personnel and monitor for suspicious admin activity. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate exposure. Implement Content Security Policy (CSP) headers to restrict script execution sources, which can mitigate the impact of XSS attacks. Employ Web Application Firewalls (WAFs) with rules targeting XSS payloads to detect and block exploitation attempts. Regularly review and harden user privileges, ensuring that only necessary users have admin rights. Conduct security awareness training to reduce the risk of credential compromise that could lead to privilege escalation. Finally, monitor WordPress security advisories and update the plugin promptly once a patch becomes available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-12T14:00:01.137Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec272

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:58:10 AM

Last updated: 7/28/2025, 9:30:50 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats