Cyber Posture

CVE-2024-13690

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0038 59.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2024-13690 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, in the WP Church Donation plugin for WordPress. It affects all versions up to and including 1.7 due to insufficient input sanitization and output escaping in several donation form submission parameters. This flaw enables the injection of arbitrary web scripts into pages, with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Unauthenticated attackers can exploit the vulnerability remotely with low complexity, no required privileges, and no user interaction. By submitting malicious payloads through the donation form parameters, attackers store scripts on affected pages. These scripts execute in users' browsers whenever the injected pages are accessed, potentially compromising session data or performing actions on behalf of victims within the site's scope.

Advisories and references, including the Wordfence threat intelligence report and the plugin's WordPress.org page, provide details on the vulnerability. Source code from version 1.7 in files such as church-donation-form-display.php and church-donation-listings.php highlights the unsanitized parameters responsible for the issue. Security practitioners should review these resources for recommended mitigations, such as updating the plugin if patches are available beyond version 1.7.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin enables T1190 (exploiting public-facing app via form injection), T1059.007 (arbitrary JavaScript execution in browser), and T1185 (session hijacking to compromise data).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References