CVE-2024-6797: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Robots.txt
The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-6797 is a medium-severity vulnerability affecting the DL Robots.txt WordPress plugin up to version 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) issue classified under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML. The attack vector requires the attacker to have high privileges (admin) and some user interaction, as the CVSS vector indicates (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). The vulnerability impacts confidentiality and integrity by enabling script injection that could hijack sessions, steal cookies, or perform actions on behalf of other users. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other sites in a multisite setup. There are no known exploits in the wild, and no patches have been linked yet. The CVSS score of 4.8 reflects a medium severity level, balancing the high privileges required and the potential impact of exploitation.
Potential Impact
For European organizations using WordPress multisite installations with the DL Robots.txt plugin, this vulnerability poses a risk of privilege escalation and persistent XSS attacks. An attacker with admin access could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, credential theft, or unauthorized actions within the WordPress environment. This could compromise the confidentiality and integrity of sensitive data managed through the CMS. Given the multisite context, the vulnerability could affect multiple sites managed under a single WordPress instance, amplifying the impact. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if such an attack leads to data breaches. Although exploitation requires admin privileges and user interaction, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target WordPress plugins due to their widespread use in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the DL Robots.txt plugin, especially in multisite environments. Until an official patch is released, administrators should restrict plugin installation and updates to trusted personnel only and consider disabling or removing the plugin if it is not essential. Implementing strict access controls and monitoring admin account activities can help detect and prevent misuse. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections related to this plugin can provide additional protection. Regularly updating WordPress core and all plugins is critical once a patch becomes available. Additionally, organizations should educate administrators about the risks of stored XSS and the importance of validating and sanitizing input, even from trusted users. Conducting security reviews and penetration testing focused on multisite configurations can help identify similar vulnerabilities proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-6797: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Robots.txt
Description
The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-6797 is a medium-severity vulnerability affecting the DL Robots.txt WordPress plugin up to version 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) issue classified under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML. The attack vector requires the attacker to have high privileges (admin) and some user interaction, as the CVSS vector indicates (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). The vulnerability impacts confidentiality and integrity by enabling script injection that could hijack sessions, steal cookies, or perform actions on behalf of other users. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other sites in a multisite setup. There are no known exploits in the wild, and no patches have been linked yet. The CVSS score of 4.8 reflects a medium severity level, balancing the high privileges required and the potential impact of exploitation.
Potential Impact
For European organizations using WordPress multisite installations with the DL Robots.txt plugin, this vulnerability poses a risk of privilege escalation and persistent XSS attacks. An attacker with admin access could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, credential theft, or unauthorized actions within the WordPress environment. This could compromise the confidentiality and integrity of sensitive data managed through the CMS. Given the multisite context, the vulnerability could affect multiple sites managed under a single WordPress instance, amplifying the impact. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if such an attack leads to data breaches. Although exploitation requires admin privileges and user interaction, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target WordPress plugins due to their widespread use in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the DL Robots.txt plugin, especially in multisite environments. Until an official patch is released, administrators should restrict plugin installation and updates to trusted personnel only and consider disabling or removing the plugin if it is not essential. Implementing strict access controls and monitoring admin account activities can help detect and prevent misuse. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections related to this plugin can provide additional protection. Regularly updating WordPress core and all plugins is critical once a patch becomes available. Additionally, organizations should educate administrators about the risks of stored XSS and the importance of validating and sanitizing input, even from trusted users. Conducting security reviews and penetration testing focused on multisite configurations can help identify similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-07-16T18:50:32.651Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec278
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 8:10:00 AM
Last updated: 7/31/2025, 2:59:16 PM
Views: 15
Related Threats
CVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumCVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.