Skip to main content

CVE-2024-9771: CWE-89 SQL Injection in Unknown WP-Recall

Low
VulnerabilityCVE-2024-9771cvecve-2024-9771cwe-89cwe-79
Published: Mon Apr 28 2025 (04/28/2025, 06:00:02 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP-Recall

Description

The WP-Recall WordPress plugin before 16.26.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 06/24/2025, 20:22:36 UTC

Technical Analysis

CVE-2024-9771 is a vulnerability identified in the WP-Recall WordPress plugin versions prior to 16.26.12. The core issue arises from improper sanitization and escaping of certain plugin settings, which can be manipulated by users with high privileges, such as administrators. This flaw enables these privileged users to perform Stored Cross-Site Scripting (XSS) attacks even when the WordPress capability 'unfiltered_html' is disabled, a scenario common in multisite WordPress setups. The vulnerability is categorized under CWE-89 (SQL Injection) and CWE-79 (Cross-Site Scripting), indicating that the plugin's failure to properly handle input data can lead to injection of malicious scripts stored persistently within the application. The CVSS 3.1 base score is 3.5, reflecting a low severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). Although the vulnerability requires high privilege access and user interaction, the risk lies in the potential for attackers with admin rights to embed malicious scripts that could affect other users or site visitors. No known exploits are currently reported in the wild, and no official patches or mitigation links have been provided yet. The vulnerability was reserved in October 2024 and published in April 2025, with enrichment from CISA and WPScan as the assigner. This vulnerability highlights the importance of rigorous input validation and output escaping in WordPress plugins, especially those managing settings accessible to privileged users.

Potential Impact

For European organizations using WordPress multisite environments with the WP-Recall plugin, this vulnerability poses a moderate risk primarily to the integrity and confidentiality of their web applications. Since exploitation requires administrative privileges and user interaction, the threat is somewhat contained within organizations that have strict access controls. However, if an attacker gains admin access—potentially through other means—they could leverage this vulnerability to inject persistent malicious scripts, potentially leading to session hijacking, credential theft, or further lateral movement within the network. This could compromise sensitive data, damage organizational reputation, and disrupt business operations. The impact is particularly relevant for sectors with high reliance on WordPress multisite setups, such as media companies, educational institutions, and government agencies in Europe. Given the low CVSS score but the potential for chained attacks, organizations should not dismiss this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

Immediately upgrade the WP-Recall plugin to version 16.26.12 or later once available to ensure the vulnerability is patched. Restrict administrative privileges strictly to trusted personnel and enforce the principle of least privilege to minimize the number of users who can exploit this vulnerability. Implement Web Application Firewall (WAF) rules tailored to detect and block suspicious input patterns associated with stored XSS and SQL injection attempts targeting WP-Recall plugin endpoints. Conduct regular security audits and code reviews of WordPress plugins, especially those that handle user input and settings, to identify and remediate similar vulnerabilities proactively. Enable and enforce Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks by restricting the execution of unauthorized scripts. Monitor logs for unusual administrative activity or unexpected changes in plugin settings that could indicate exploitation attempts. Educate administrators on the risks of stored XSS and the importance of cautious input handling, especially in multisite environments where the unfiltered_html capability is disabled but this vulnerability still applies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-10-09T20:43:28.461Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef658

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 8:22:36 PM

Last updated: 8/12/2025, 10:07:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats