CVE-2024-13704
Published: 18 February 2025
Description
The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'st_user_title' parameter in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Security Summary
CVE-2024-13704 is a stored cross-site scripting (XSS) vulnerability in the Super Testimonials plugin for WordPress, affecting all versions up to and including 4.0.1. The issue arises from insufficient input sanitization and output escaping of the 'st_user_title' parameter, enabling the injection of arbitrary web scripts into pages.
Unauthenticated attackers can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and resulting in a changed scope (S:C) with low impacts to confidentiality and integrity but no availability impact, as reflected in its CVSS v3.1 base score of 7.2. Exploitation allows attackers to inject malicious scripts that execute whenever any user accesses the affected page.
Advisories and patch details are available from the WordPress plugin trac changeset at https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240039%40super-testimonial&new=3240039%40super-testimonial&sfp_email=&sfph_mail= and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/20720912-6bfd-4df1-97c7-7025c16d7a0f?source=cve. The vulnerability is linked to CWE-79 and CWE-80.
Details
- CWE(s)