Skip to main content

CVE-2024-6797: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Robots.txt

Medium
VulnerabilityCVE-2024-6797cvecve-2024-6797cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:10 UTC)
Source: CVE
Vendor/Project: Unknown
Product: DL Robots.txt

Description

The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 08:10:00 UTC

Technical Analysis

CVE-2024-6797 is a medium-severity vulnerability affecting the DL Robots.txt WordPress plugin up to version 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) issue classified under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML. The attack vector requires the attacker to have high privileges (admin) and some user interaction, as the CVSS vector indicates (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). The vulnerability impacts confidentiality and integrity by enabling script injection that could hijack sessions, steal cookies, or perform actions on behalf of other users. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other sites in a multisite setup. There are no known exploits in the wild, and no patches have been linked yet. The CVSS score of 4.8 reflects a medium severity level, balancing the high privileges required and the potential impact of exploitation.

Potential Impact

For European organizations using WordPress multisite installations with the DL Robots.txt plugin, this vulnerability poses a risk of privilege escalation and persistent XSS attacks. An attacker with admin access could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, credential theft, or unauthorized actions within the WordPress environment. This could compromise the confidentiality and integrity of sensitive data managed through the CMS. Given the multisite context, the vulnerability could affect multiple sites managed under a single WordPress instance, amplifying the impact. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if such an attack leads to data breaches. Although exploitation requires admin privileges and user interaction, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target WordPress plugins due to their widespread use in Europe.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the DL Robots.txt plugin, especially in multisite environments. Until an official patch is released, administrators should restrict plugin installation and updates to trusted personnel only and consider disabling or removing the plugin if it is not essential. Implementing strict access controls and monitoring admin account activities can help detect and prevent misuse. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections related to this plugin can provide additional protection. Regularly updating WordPress core and all plugins is critical once a patch becomes available. Additionally, organizations should educate administrators about the risks of stored XSS and the importance of validating and sanitizing input, even from trusted users. Conducting security reviews and penetration testing focused on multisite configurations can help identify similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-16T18:50:32.651Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec278

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 8:10:00 AM

Last updated: 7/31/2025, 2:59:16 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats