Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6894: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in filipe-mateus-do-nascimento RD Station

0
Medium
VulnerabilityCVE-2024-6894cvecve-2024-6894cwe-79
Published: Thu Sep 05 2024 (09/05/2024, 09:29:49 UTC)
Source: CVE Database V5
Vendor/Project: filipe-mateus-do-nascimento
Product: RD Station

Description

CVE-2024-6894 is a stored cross-site scripting (XSS) vulnerability in the RD Station WordPress plugin up to version 5. 3. 2. It arises from improper input sanitization and output escaping of post metaboxes, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild yet. Exploitation requires authentication but no user interaction beyond viewing the infected page. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites globally, especially those relying on RD Station for marketing automation.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:27:19 UTC

Technical Analysis

CVE-2024-6894 is a stored cross-site scripting vulnerability identified in the RD Station plugin for WordPress, maintained by filipe-mateus-do-nascimento. The flaw exists in all versions up to and including 5.3.2 due to insufficient sanitization and escaping of input data in post metaboxes added by the plugin. Specifically, authenticated users with Contributor-level permissions or higher can inject arbitrary JavaScript code into these metaboxes. When any user, including administrators or visitors, accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the victim. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common XSS category. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, requiring privileges, no user interaction, and partial impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using RD Station, especially those with multiple contributors. The scope is broad as it affects all plugin versions up to 5.3.2 and can impact any site where the plugin is installed. The vulnerability underscores the importance of rigorous input validation and output encoding in web applications, particularly plugins that extend CMS functionality.

Potential Impact

The impact of CVE-2024-6894 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows attackers with contributor-level access to execute arbitrary scripts in the context of other users, including administrators. This can lead to session hijacking, unauthorized data access, defacement, or further compromise of the website and its users. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the infected page, increasing the attack surface. Organizations relying on RD Station for marketing automation and lead management may suffer reputational damage, data leakage, and potential compliance violations if customer data is exposed. The vulnerability does not directly affect availability but can indirectly disrupt operations through administrative account compromise or content manipulation. Given WordPress's widespread use globally, the threat can affect a large number of websites, particularly those with multiple content contributors and marketing teams. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but this is common in collaborative environments, making the risk significant.

Mitigation Recommendations

To mitigate CVE-2024-6894, organizations should first update the RD Station plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict Contributor-level permissions to trusted users only and audit existing user roles to minimize risk. Implementing a Web Application Firewall (WAF) with rules to detect and block common XSS payloads can provide temporary protection. Site administrators should also enable Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Regularly scanning the website for injected scripts or unusual content in post metaboxes can help detect exploitation attempts. Educating content contributors about safe input practices and monitoring logs for suspicious activities are additional layers of defense. Finally, applying the principle of least privilege and enforcing strong authentication mechanisms reduces the likelihood of account compromise that could lead to exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-18T19:45:16.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c0eb7ef31ef0b55f6f2

Added to database: 2/25/2026, 9:39:26 PM

Last enriched: 2/26/2026, 3:27:19 AM

Last updated: 2/26/2026, 8:16:41 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats