CVE-2024-6798: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Verification
The DL Verification WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-6798 is a medium-severity vulnerability identified in the DL Verification WordPress plugin, specifically affecting versions up to 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings inputs. This deficiency allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and later executed in the context of other users or administrators. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring high privileges, and user interaction. The impact primarily affects confidentiality and integrity, with no direct impact on availability. The vulnerability scope is changed, indicating that the exploit could affect resources beyond the initially vulnerable component. There are no known exploits in the wild at this time, and no patches have been published yet. This vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or redirection to malicious sites, especially in administrative contexts where the attacker can manipulate site settings or content.
Potential Impact
For European organizations using the DL Verification WordPress plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications. Since the exploit requires high privileges, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to unauthorized access to sensitive data, manipulation of site content, or further compromise of the WordPress environment. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Multisite WordPress installations, common in larger organizations or managed service providers in Europe, are particularly at risk due to the bypass of unfiltered_html restrictions. Although no known exploits exist currently, the presence of this vulnerability in a plugin used for identity verification or document validation could undermine trust in digital services, especially in sectors like finance, healthcare, or government where document verification is critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the DL Verification plugin and its version. Until an official patch is released, administrators should restrict plugin usage to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing strict role-based access controls to limit administrative privileges can reduce the risk of exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting plugin settings can provide a protective layer. Monitoring logs for unusual administrative activity or unexpected changes in plugin settings is advisable. Organizations should also prepare to apply patches promptly once available and consider isolating WordPress environments to minimize lateral movement in case of compromise. Educating administrators about the risks of stored XSS and safe plugin management practices is essential to prevent exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-6798: CWE-79 Cross-Site Scripting (XSS) in Unknown DL Verification
Description
The DL Verification WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-6798 is a medium-severity vulnerability identified in the DL Verification WordPress plugin, specifically affecting versions up to 1.2. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings inputs. This deficiency allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and later executed in the context of other users or administrators. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring high privileges, and user interaction. The impact primarily affects confidentiality and integrity, with no direct impact on availability. The vulnerability scope is changed, indicating that the exploit could affect resources beyond the initially vulnerable component. There are no known exploits in the wild at this time, and no patches have been published yet. This vulnerability is significant because stored XSS can lead to session hijacking, privilege escalation, or redirection to malicious sites, especially in administrative contexts where the attacker can manipulate site settings or content.
Potential Impact
For European organizations using the DL Verification WordPress plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications. Since the exploit requires high privileges, the threat is mainly from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to unauthorized access to sensitive data, manipulation of site content, or further compromise of the WordPress environment. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Multisite WordPress installations, common in larger organizations or managed service providers in Europe, are particularly at risk due to the bypass of unfiltered_html restrictions. Although no known exploits exist currently, the presence of this vulnerability in a plugin used for identity verification or document validation could undermine trust in digital services, especially in sectors like finance, healthcare, or government where document verification is critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the DL Verification plugin and its version. Until an official patch is released, administrators should restrict plugin usage to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing strict role-based access controls to limit administrative privileges can reduce the risk of exploitation. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting plugin settings can provide a protective layer. Monitoring logs for unusual administrative activity or unexpected changes in plugin settings is advisable. Organizations should also prepare to apply patches promptly once available and consider isolating WordPress environments to minimize lateral movement in case of compromise. Educating administrators about the risks of stored XSS and safe plugin management practices is essential to prevent exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-07-16T18:50:59.744Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb8cc
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/4/2025, 3:27:36 PM
Last updated: 7/26/2025, 8:29:50 PM
Views: 13
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.