CVE-2024-8759: CWE-79 Cross-Site Scripting (XSS) in Unknown Nested Pages
The Nested Pages WordPress plugin before 3.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-8759 is a medium-severity vulnerability affecting the Nested Pages WordPress plugin versions prior to 3.2.9. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts into the plugin's stored data. This can occur even when the unfiltered_html capability is disabled, for example in multisite WordPress setups where administrators do not have unrestricted HTML editing rights. The vulnerability requires high privileges (admin-level access) and user interaction (such as viewing the malicious content) to be exploited. The CVSS 3.1 base score is 4.8, reflecting a medium severity level. The vector indicates network attack vector (remote), low attack complexity, high privileges required, user interaction required, and a scope change, with limited impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches are linked yet. This vulnerability could allow an attacker with admin access to inject persistent malicious JavaScript, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users.
Potential Impact
For European organizations using WordPress sites with the Nested Pages plugin, this vulnerability poses a risk primarily if an attacker gains or already has administrative access. The stored XSS could be leveraged to execute malicious scripts in the context of other administrators or users with elevated privileges, potentially leading to unauthorized actions, data leakage, or further compromise of the website infrastructure. Given the widespread use of WordPress in Europe for business, government, and non-profit websites, exploitation could result in reputational damage, data breaches, and disruption of services. Multisite WordPress installations, common in larger organizations and educational institutions, are particularly at risk due to the noted bypass of unfiltered_html restrictions. Although the vulnerability requires high privileges, the risk is significant if internal accounts are compromised or insider threats exist. The medium CVSS score reflects moderate impact but the potential for chained attacks or privilege escalation increases the threat's seriousness in sensitive environments.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the Nested Pages plugin and verify the version in use. Updating the plugin to version 3.2.9 or later, once available, is the primary mitigation step. Until patches are released, administrators should restrict admin access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor for suspicious admin activity. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize all plugin settings and stored data manually if possible. Additionally, organizations should conduct security awareness training for administrators to recognize and avoid injecting unsafe content. For multisite setups, carefully review user capabilities and consider additional hardening measures such as limiting plugin installation rights and isolating critical sites. Employing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections related to Nested Pages plugin settings can provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-8759: CWE-79 Cross-Site Scripting (XSS) in Unknown Nested Pages
Description
The Nested Pages WordPress plugin before 3.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-8759 is a medium-severity vulnerability affecting the Nested Pages WordPress plugin versions prior to 3.2.9. The vulnerability is a Stored Cross-Site Scripting (XSS) flaw categorized under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts into the plugin's stored data. This can occur even when the unfiltered_html capability is disabled, for example in multisite WordPress setups where administrators do not have unrestricted HTML editing rights. The vulnerability requires high privileges (admin-level access) and user interaction (such as viewing the malicious content) to be exploited. The CVSS 3.1 base score is 4.8, reflecting a medium severity level. The vector indicates network attack vector (remote), low attack complexity, high privileges required, user interaction required, and a scope change, with limited impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches are linked yet. This vulnerability could allow an attacker with admin access to inject persistent malicious JavaScript, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users.
Potential Impact
For European organizations using WordPress sites with the Nested Pages plugin, this vulnerability poses a risk primarily if an attacker gains or already has administrative access. The stored XSS could be leveraged to execute malicious scripts in the context of other administrators or users with elevated privileges, potentially leading to unauthorized actions, data leakage, or further compromise of the website infrastructure. Given the widespread use of WordPress in Europe for business, government, and non-profit websites, exploitation could result in reputational damage, data breaches, and disruption of services. Multisite WordPress installations, common in larger organizations and educational institutions, are particularly at risk due to the noted bypass of unfiltered_html restrictions. Although the vulnerability requires high privileges, the risk is significant if internal accounts are compromised or insider threats exist. The medium CVSS score reflects moderate impact but the potential for chained attacks or privilege escalation increases the threat's seriousness in sensitive environments.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the Nested Pages plugin and verify the version in use. Updating the plugin to version 3.2.9 or later, once available, is the primary mitigation step. Until patches are released, administrators should restrict admin access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor for suspicious admin activity. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize all plugin settings and stored data manually if possible. Additionally, organizations should conduct security awareness training for administrators to recognize and avoid injecting unsafe content. For multisite setups, carefully review user capabilities and consider additional hardening measures such as limiting plugin installation rights and isolating critical sites. Employing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections related to Nested Pages plugin settings can provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-09-12T18:36:24.887Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb910
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/4/2025, 3:55:22 PM
Last updated: 7/28/2025, 7:05:54 AM
Views: 12
Related Threats
CVE-2025-50617: n/a
UnknownCVE-2025-23304: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NVIDIA NVIDIA NeMo Framework
HighCVE-2025-23303: CWE-502 Deserialization of Untrusted Data in NVIDIA NVIDIA NeMo Framework
HighCVE-2025-23295: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Apex
HighCVE-2025-2184: CWE-1392: Use of Default Credentials in Palo Alto Networks Cortex XDR Broker VM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.