Skip to main content

CVE-2024-6798: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Verification

Medium
VulnerabilityCVE-2024-6798cvecve-2024-6798cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:10 UTC)
Source: CVE
Vendor/Project: Unknown
Product: DL Verification

Description

The DL Verification WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 15:27:36 UTC

Technical Analysis

CVE-2024-6798 is a medium-severity vulnerability identified in the DL Verification WordPress plugin, specifically affecting versions up to 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings inputs. This deficiency allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and later executed in the context of other users or administrators. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring high privileges, and user interaction. The impact primarily affects confidentiality and integrity, with no direct impact on availability. The vulnerability scope is changed, indicating that the exploit could affect resources beyond the initially vulnerable component. There are no known exploits in the wild at this time, and no patches have been published yet. This vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or redirection to malicious sites, especially in administrative contexts where the attacker can manipulate site settings or content.

Potential Impact

For European organizations using the DL Verification WordPress plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications. Since the exploit requires high privileges, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to unauthorized access to sensitive data, manipulation of site content, or further compromise of the WordPress environment. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Multisite WordPress installations, common in larger organizations or managed service providers in Europe, are particularly at risk due to the bypass of unfiltered_html restrictions. Although no known exploits exist currently, the presence of this vulnerability in a plugin used for identity verification or document validation could undermine trust in digital services, especially in sectors like finance, healthcare, or government where document verification is critical.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the DL Verification plugin and its version. Until an official patch is released, administrators should restrict plugin usage to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing strict role-based access controls to limit administrative privileges can reduce the risk of exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting plugin settings can provide a protective layer. Monitoring logs for unusual administrative activity or unexpected changes in plugin settings is advisable. Organizations should also prepare to apply patches promptly once available and consider isolating WordPress environments to minimize lateral movement in case of compromise. Educating administrators about the risks of stored XSS and safe plugin management practices is essential to prevent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-07-16T18:50:59.744Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb8cc

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:27:36 PM

Last updated: 7/26/2025, 8:29:50 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats