Skip to main content

CVE-2024-9599: CWE-79 Cross-Site Scripting (XSS) in Unknown Popup Box

Medium
VulnerabilityCVE-2024-9599cvecve-2024-9599cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:21 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Popup Box

Description

The Popup Box WordPress plugin before 4.7.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 16:10:09 UTC

Technical Analysis

CVE-2024-9599 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Popup Box WordPress plugin versions prior to 4.7.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this exploitation is possible even when the unfiltered_html capability is disabled, such as in multisite WordPress configurations, which typically restrict script injection. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of a user with some privileges (PR:L). User interaction is required (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Since no known exploits are reported in the wild, the threat is currently theoretical but could be leveraged by attackers to execute malicious JavaScript in the context of the affected WordPress site, potentially leading to session hijacking, privilege escalation, or defacement.

Potential Impact

For European organizations using WordPress sites with the vulnerable Popup Box plugin, this vulnerability poses a risk primarily to site integrity and confidentiality. Attackers with admin-level access could inject malicious scripts that execute in the browsers of other administrators or users with elevated privileges, potentially leading to credential theft, unauthorized actions, or further compromise of the site. In multisite environments common in larger organizations or managed service providers, the risk is exacerbated because the usual safeguard of disabling unfiltered_html is ineffective against this vulnerability. This could lead to widespread compromise across multiple sites within a network. Given the reliance on WordPress for many corporate websites, e-commerce platforms, and intranets in Europe, exploitation could result in reputational damage, data breaches, and regulatory non-compliance under GDPR if personal data is exposed or manipulated.

Mitigation Recommendations

Organizations should immediately verify if the Popup Box plugin is installed and identify the version in use. If vulnerable versions prior to 4.7.8 are detected, an update to the latest patched version should be applied as soon as it becomes available. Until a patch is released, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if feasible. Additionally, implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and use Web Application Firewalls (WAFs) with rules targeting XSS payloads. Regularly audit user privileges to ensure only necessary users have administrative rights. For multisite setups, extra caution is warranted; consider isolating sites or applying network-level protections. Monitoring logs for suspicious activity related to plugin settings changes can help detect attempted exploitation early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-07T18:41:38.577Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba78

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:10:09 PM

Last updated: 8/1/2025, 10:15:16 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats