Cyber Posture

CVE-2024-13624

HighPublic PoC

Published: 26 February 2025

Published
26 February 2025
Modified
15 May 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0129 79.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The WPMovieLibrary WordPress plugin through 2.1.4.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

Security Summary

CVE-2024-13624 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the WPMovieLibrary WordPress plugin in versions through 2.1.4.8. The flaw arises because the plugin does not sanitize and escape a parameter before outputting it back in the page, enabling malicious script injection. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.

Attackers can exploit this vulnerability remotely without authentication by crafting malicious links or payloads that reflect unsanitized input. Exploitation requires tricking a targeted user, particularly high-privilege accounts such as administrators, into interacting with the malicious content via their browser. Successful attacks can lead to script execution in the victim's context, potentially allowing limited impacts like session token theft, phishing, or unauthorized actions on behalf of the user.

The WPScan advisory at https://wpscan.com/vulnerability/c19b56cc-634f-420f-b6a0-9a10ad159049/ provides detailed information on the vulnerability, including exploitation vectors and recommended mitigations for affected WordPress installations.

Details

CWE(s)
CWE-79

Affected Products

caercam
wpmovielibrary
≤ 2.1.4.8

References