CVE-2024-8920: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vladolaru Fonto – Custom Web Fonts Manager
CVE-2024-8920 is a stored cross-site scripting (XSS) vulnerability in the Fonto – Custom Web Fonts Manager WordPress plugin, affecting all versions up to 1. 2. 1. The flaw arises from improper sanitization and escaping of SVG file uploads, allowing authenticated users with Author-level or higher privileges to inject malicious scripts. These scripts execute whenever any user accesses the malicious SVG file, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity), requires no user interaction, but does require authenticated access with limited privileges. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential XSS attacks that could lead to data theft or session hijacking. Countries with high WordPress usage and significant adoption of this plugin are at greater risk.
AI Analysis
Technical Summary
CVE-2024-8920 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Fonto – Custom Web Fonts Manager plugin for WordPress. This vulnerability affects all versions up to and including 1.2.1. The root cause is insufficient input sanitization and output escaping of SVG file uploads within the plugin. Authenticated attackers with Author-level or higher privileges can upload crafted SVG files containing malicious JavaScript payloads. When any user, including administrators or visitors, accesses a page that loads the malicious SVG, the embedded script executes in their browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability does not require user interaction beyond accessing the affected page and does not require elevated privileges beyond Author-level access, which is a relatively low bar in WordPress environments. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the widespread use of WordPress and the plugin’s functionality. The vulnerability highlights the importance of proper input validation and output encoding, especially for user-uploaded content like SVG files, which can contain executable scripts.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks that can compromise the confidentiality and integrity of user data. Attackers can hijack user sessions, steal cookies, or perform unauthorized actions on behalf of victims, including administrators. This can lead to further compromise of the WordPress site, including privilege escalation, data leakage, or defacement. Since the vulnerability requires only Author-level access, attackers who gain such privileges through other means can leverage this flaw to escalate their impact. The availability of the site is not directly affected, but the reputational damage and potential data breaches can have severe consequences for organizations. Given WordPress’s extensive use worldwide, especially among small to medium enterprises and content-heavy websites, the threat surface is broad. Organizations relying on this plugin for custom font management are particularly at risk, and failure to mitigate could lead to targeted attacks or automated exploitation once public exploits emerge.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Fonto – Custom Web Fonts Manager plugin and its version. Until an official patch is released, administrators should restrict Author-level privileges to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious SVG payloads can provide interim protection. Additionally, administrators should monitor uploaded SVG files for suspicious content and sanitize or remove any untrusted SVG uploads. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution contexts. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories for this plugin, will ensure timely application of patches once available. Finally, educating users about the risks of privilege misuse and maintaining strong access controls will reduce the likelihood of exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-8920: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vladolaru Fonto – Custom Web Fonts Manager
Description
CVE-2024-8920 is a stored cross-site scripting (XSS) vulnerability in the Fonto – Custom Web Fonts Manager WordPress plugin, affecting all versions up to 1. 2. 1. The flaw arises from improper sanitization and escaping of SVG file uploads, allowing authenticated users with Author-level or higher privileges to inject malicious scripts. These scripts execute whenever any user accesses the malicious SVG file, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity), requires no user interaction, but does require authenticated access with limited privileges. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential XSS attacks that could lead to data theft or session hijacking. Countries with high WordPress usage and significant adoption of this plugin are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-8920 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Fonto – Custom Web Fonts Manager plugin for WordPress. This vulnerability affects all versions up to and including 1.2.1. The root cause is insufficient input sanitization and output escaping of SVG file uploads within the plugin. Authenticated attackers with Author-level or higher privileges can upload crafted SVG files containing malicious JavaScript payloads. When any user, including administrators or visitors, accesses a page that loads the malicious SVG, the embedded script executes in their browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability does not require user interaction beyond accessing the affected page and does not require elevated privileges beyond Author-level access, which is a relatively low bar in WordPress environments. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the widespread use of WordPress and the plugin’s functionality. The vulnerability highlights the importance of proper input validation and output encoding, especially for user-uploaded content like SVG files, which can contain executable scripts.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks that can compromise the confidentiality and integrity of user data. Attackers can hijack user sessions, steal cookies, or perform unauthorized actions on behalf of victims, including administrators. This can lead to further compromise of the WordPress site, including privilege escalation, data leakage, or defacement. Since the vulnerability requires only Author-level access, attackers who gain such privileges through other means can leverage this flaw to escalate their impact. The availability of the site is not directly affected, but the reputational damage and potential data breaches can have severe consequences for organizations. Given WordPress’s extensive use worldwide, especially among small to medium enterprises and content-heavy websites, the threat surface is broad. Organizations relying on this plugin for custom font management are particularly at risk, and failure to mitigate could lead to targeted attacks or automated exploitation once public exploits emerge.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Fonto – Custom Web Fonts Manager plugin and its version. Until an official patch is released, administrators should restrict Author-level privileges to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious SVG payloads can provide interim protection. Additionally, administrators should monitor uploaded SVG files for suspicious content and sanitize or remove any untrusted SVG uploads. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution contexts. Regularly updating WordPress core and plugins, and subscribing to vulnerability advisories for this plugin, will ensure timely application of patches once available. Finally, educating users about the risks of privilege misuse and maintaining strong access controls will reduce the likelihood of exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-16T22:37:47.915Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b3ab7ef31ef0b54f7e8
Added to database: 2/25/2026, 9:35:54 PM
Last enriched: 2/25/2026, 10:55:00 PM
Last updated: 2/26/2026, 8:06:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.