CVE-2024-8665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH Custom Login
CVE-2024-8665 is a reflected cross-site scripting (XSS) vulnerability in the YITH Custom Login WordPress plugin, affecting all versions up to 1. 7. 3. The flaw arises from improper input neutralization when using the add_query_arg function without proper escaping, allowing unauthenticated attackers to inject malicious scripts via crafted URLs. Exploitation requires tricking a user into clicking a malicious link, leading to script execution in the victim's browser. The vulnerability impacts confidentiality and integrity but does not affect availability. It has a CVSS score of 6. 1 (medium severity) with no known exploits in the wild yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential phishing or session hijacking attacks. Countries with large WordPress user bases and significant e-commerce or content management deployments are most at risk.
AI Analysis
Technical Summary
CVE-2024-8665 is a reflected cross-site scripting vulnerability identified in the YITH Custom Login plugin for WordPress, a widely used plugin that customizes login pages. The vulnerability stems from the plugin's use of the WordPress function add_query_arg without proper escaping of URL parameters, which leads to improper neutralization of user-supplied input during web page generation. This flaw allows unauthenticated attackers to craft malicious URLs containing arbitrary JavaScript code. When a victim clicks such a link, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The vulnerability affects all versions up to and including 1.7.3. The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the vulnerability affects the confidentiality and integrity of user data but not availability. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. This vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS attacks. Given the widespread use of WordPress and the popularity of YITH plugins, this vulnerability poses a significant risk to websites using this plugin, especially those handling sensitive user data or authentication.
Potential Impact
The primary impact of CVE-2024-8665 is on the confidentiality and integrity of user sessions and data. Successful exploitation can allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to theft of authentication cookies, session tokens, or other sensitive information. This can facilitate account takeover, unauthorized actions on behalf of the user, or redirection to malicious websites for further exploitation. Although availability is not directly affected, the reputational damage and loss of user trust can be significant for affected organizations. E-commerce sites, membership portals, and any WordPress sites relying on YITH Custom Login for authentication customization are particularly vulnerable. The attack requires no authentication but does require user interaction (clicking a malicious link), which can be facilitated via phishing campaigns. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. Organizations worldwide that use this plugin are at risk of targeted attacks aiming to compromise user accounts or deliver malware via injected scripts.
Mitigation Recommendations
1. Immediately update the YITH Custom Login plugin to a patched version once it becomes available from the vendor. Monitor official channels for patch releases. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block suspicious query parameters or script injection attempts targeting the plugin's endpoints. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages, mitigating the impact of injected scripts. 4. Educate users and administrators about the risks of clicking unsolicited or suspicious links, especially those purporting to be related to login or account management. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and their versions to identify vulnerable instances. 6. Consider temporarily disabling or replacing the YITH Custom Login plugin with alternative solutions that do not exhibit this vulnerability if patching is delayed. 7. Monitor logs for unusual URL parameters or repeated attempts to exploit query arguments that could indicate reconnaissance or exploitation attempts. 8. Harden WordPress installations by limiting plugin usage to trusted and actively maintained plugins and keeping all components updated.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Italy, Netherlands, Brazil, India, Japan, Spain
CVE-2024-8665: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH Custom Login
Description
CVE-2024-8665 is a reflected cross-site scripting (XSS) vulnerability in the YITH Custom Login WordPress plugin, affecting all versions up to 1. 7. 3. The flaw arises from improper input neutralization when using the add_query_arg function without proper escaping, allowing unauthenticated attackers to inject malicious scripts via crafted URLs. Exploitation requires tricking a user into clicking a malicious link, leading to script execution in the victim's browser. The vulnerability impacts confidentiality and integrity but does not affect availability. It has a CVSS score of 6. 1 (medium severity) with no known exploits in the wild yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential phishing or session hijacking attacks. Countries with large WordPress user bases and significant e-commerce or content management deployments are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-8665 is a reflected cross-site scripting vulnerability identified in the YITH Custom Login plugin for WordPress, a widely used plugin that customizes login pages. The vulnerability stems from the plugin's use of the WordPress function add_query_arg without proper escaping of URL parameters, which leads to improper neutralization of user-supplied input during web page generation. This flaw allows unauthenticated attackers to craft malicious URLs containing arbitrary JavaScript code. When a victim clicks such a link, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The vulnerability affects all versions up to and including 1.7.3. The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the vulnerability affects the confidentiality and integrity of user data but not availability. No patches or official fixes have been linked yet, and no known exploits are reported in the wild. This vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS attacks. Given the widespread use of WordPress and the popularity of YITH plugins, this vulnerability poses a significant risk to websites using this plugin, especially those handling sensitive user data or authentication.
Potential Impact
The primary impact of CVE-2024-8665 is on the confidentiality and integrity of user sessions and data. Successful exploitation can allow attackers to execute arbitrary scripts in the context of the victim's browser, potentially leading to theft of authentication cookies, session tokens, or other sensitive information. This can facilitate account takeover, unauthorized actions on behalf of the user, or redirection to malicious websites for further exploitation. Although availability is not directly affected, the reputational damage and loss of user trust can be significant for affected organizations. E-commerce sites, membership portals, and any WordPress sites relying on YITH Custom Login for authentication customization are particularly vulnerable. The attack requires no authentication but does require user interaction (clicking a malicious link), which can be facilitated via phishing campaigns. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. Organizations worldwide that use this plugin are at risk of targeted attacks aiming to compromise user accounts or deliver malware via injected scripts.
Mitigation Recommendations
1. Immediately update the YITH Custom Login plugin to a patched version once it becomes available from the vendor. Monitor official channels for patch releases. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block suspicious query parameters or script injection attempts targeting the plugin's endpoints. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages, mitigating the impact of injected scripts. 4. Educate users and administrators about the risks of clicking unsolicited or suspicious links, especially those purporting to be related to login or account management. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and their versions to identify vulnerable instances. 6. Consider temporarily disabling or replacing the YITH Custom Login plugin with alternative solutions that do not exhibit this vulnerability if patching is delayed. 7. Monitor logs for unusual URL parameters or repeated attempts to exploit query arguments that could indicate reconnaissance or exploitation attempts. 8. Harden WordPress installations by limiting plugin usage to trusted and actively maintained plugins and keeping all components updated.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-10T16:49:16.939Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c2eb7ef31ef0b560db3
Added to database: 2/25/2026, 9:39:58 PM
Last enriched: 2/26/2026, 4:09:06 AM
Last updated: 2/26/2026, 6:16:41 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.