Cyber Posture

CVE-2024-13704

High

Published: 18 February 2025

Published
18 February 2025
Modified
07 January 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0022 44.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'st_user_title' parameter in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Security Summary

CVE-2024-13704 is a stored cross-site scripting (XSS) vulnerability in the Super Testimonials plugin for WordPress, affecting all versions up to and including 4.0.1. The issue arises from insufficient input sanitization and output escaping of the 'st_user_title' parameter, enabling the injection of arbitrary web scripts into pages.

Unauthenticated attackers can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and resulting in a changed scope (S:C) with low impacts to confidentiality and integrity but no availability impact, as reflected in its CVSS v3.1 base score of 7.2. Exploitation allows attackers to inject malicious scripts that execute whenever any user accesses the affected page.

Advisories and patch details are available from the WordPress plugin trac changeset at https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240039%40super-testimonial&new=3240039%40super-testimonial&sfp_email=&sfph_mail= and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/20720912-6bfd-4df1-97c7-7025c16d7a0f?source=cve. The vulnerability is linked to CWE-79 and CWE-80.

Details

CWE(s)
CWE-80CWE-79

Affected Products

themepoints
super testimonials
≤ 4.0.2

References