Skip to main content

CVE-2024-8759: CWE-79 Cross-Site Scripting (XSS) in Unknown Nested Pages

Medium
VulnerabilityCVE-2024-8759cvecve-2024-8759cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:18 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Nested Pages

Description

The Nested Pages WordPress plugin before 3.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 15:55:22 UTC

Technical Analysis

CVE-2024-8759 is a medium-severity vulnerability affecting the Nested Pages WordPress plugin versions prior to 3.2.9. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts into the plugin's stored data. This can occur even when the unfiltered_html capability is disabled, for example in multisite WordPress setups where administrators do not have unrestricted HTML editing rights. The vulnerability requires high privileges (admin-level access) and user interaction (such as viewing the malicious content) to be exploited. The CVSS 3.1 base score is 4.8, reflecting a medium severity level. The vector indicates network attack vector (remote), low attack complexity, high privileges required, user interaction required, and a scope change, with limited impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches are linked yet. This vulnerability could allow an attacker with admin access to inject persistent malicious JavaScript, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users.

Potential Impact

For European organizations using WordPress sites with the Nested Pages plugin, this vulnerability poses a risk primarily if an attacker gains or already has administrative access. The stored XSS could be leveraged to execute malicious scripts in the context of other administrators or users with elevated privileges, potentially leading to unauthorized actions, data leakage, or further compromise of the website infrastructure. Given the widespread use of WordPress in Europe for business, government, and non-profit websites, exploitation could result in reputational damage, data breaches, and disruption of services. Multisite WordPress installations, common in larger organizations and educational institutions, are particularly at risk due to the noted bypass of unfiltered_html restrictions. Although the vulnerability requires high privileges, the risk is significant if internal accounts are compromised or insider threats exist. The medium CVSS score reflects moderate impact but the potential for chained attacks or privilege escalation increases the threat's seriousness in sensitive environments.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the use of the Nested Pages plugin and verify the version in use. Updating the plugin to version 3.2.9 or later, once available, is the primary mitigation step. Until patches are released, administrators should restrict admin access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor for suspicious admin activity. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize all plugin settings and stored data manually if possible. Additionally, organizations should conduct security awareness training for administrators to recognize and avoid injecting unsafe content. For multisite setups, carefully review user capabilities and consider additional hardening measures such as limiting plugin installation rights and isolating critical sites. Employing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections related to Nested Pages plugin settings can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-09-12T18:36:24.887Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb910

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:55:22 PM

Last updated: 7/28/2025, 7:05:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats