Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9591: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amu02aftab Category and Taxonomy Image

0
Medium
VulnerabilityCVE-2024-9591cvecve-2024-9591cwe-79
Published: Tue Oct 22 2024 (10/22/2024, 07:36:34 UTC)
Source: CVE Database V5
Vendor/Project: amu02aftab
Product: Category and Taxonomy Image

Description

CVE-2024-9591 is a stored Cross-Site Scripting (XSS) vulnerability in the Category and Taxonomy Image WordPress plugin (versions up to 1. 0. 0). It arises from improper input sanitization and output escaping of the '_category_image' parameter, allowing authenticated users with editor-level or higher permissions to inject malicious scripts. These scripts execute whenever any user accesses the compromised page. The vulnerability specifically affects multi-site WordPress installations or those with unfiltered_html disabled. Exploitation requires no user interaction but does require elevated privileges. The CVSS score is 5. 5 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:27:31 UTC

Technical Analysis

CVE-2024-9591 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Category and Taxonomy Image plugin for WordPress, developed by amu02aftab. The flaw exists in versions up to and including 1.0.0 due to insufficient sanitization and escaping of user-supplied input in the '_category_image' parameter. This parameter is used during web page generation, and the lack of proper neutralization allows authenticated users with editor-level or higher permissions to inject arbitrary JavaScript code. When other users access the affected pages, the injected scripts execute in their browsers, potentially compromising their sessions or performing unauthorized actions. The vulnerability specifically impacts multi-site WordPress installations or single-site installations where the 'unfiltered_html' capability is disabled, limiting the scope of exploitation. The CVSS 3.1 base score is 5.5, indicating a medium severity with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No patches or fixes have been linked yet, and no known exploits have been reported in the wild. This vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those handling user-generated content or attributes.

Potential Impact

The primary impact of CVE-2024-9591 is the potential for persistent Cross-Site Scripting attacks within WordPress environments using the vulnerable plugin. Successful exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or redirection to malicious sites. Since the vulnerability requires editor-level privileges, it could be leveraged by malicious insiders or compromised accounts to escalate attacks against other users, including administrators. The scope change in the CVSS vector indicates that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress multi-site network. Although availability is not affected, the confidentiality and integrity of user data and site content can be compromised. Organizations relying on multi-site WordPress installations or those with restricted HTML filtering are at higher risk. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially as the vulnerability becomes publicly known.

Mitigation Recommendations

To mitigate CVE-2024-9591, organizations should first verify if they are running the Category and Taxonomy Image plugin version 1.0.0 or earlier in multi-site WordPress environments or with unfiltered_html disabled. Immediate mitigation steps include: 1) Restrict editor-level permissions strictly and audit user roles to ensure no unauthorized users have elevated privileges; 2) Temporarily disable or remove the vulnerable plugin until a patch is released; 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the '_category_image' parameter; 4) Enable Content Security Policy (CSP) headers to limit the impact of injected scripts; 5) Monitor logs for unusual activity or injection attempts related to this plugin; 6) Educate site administrators about the risks of granting editor or higher privileges; 7) Once available, promptly apply vendor patches or updates addressing this vulnerability. Additionally, consider using security plugins that sanitize inputs and outputs or employ custom filters to validate parameters before processing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-07T16:35:26.770Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b52b7ef31ef0b5522a8

Added to database: 2/25/2026, 9:36:18 PM

Last enriched: 2/25/2026, 11:27:31 PM

Last updated: 2/26/2026, 11:22:11 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats