Cyber Posture

CVE-2024-13884

HighPublic PoC

Published: 13 March 2025

Published
13 March 2025
Modified
29 April 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0009 25.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13884 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Rivercitygraphix Limit Bio. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates reflected XSS by filtering and encoding plugin output to neutralize malicious scripts in the unsanitized parameter.

prevent

Validates user inputs to the plugin parameter, preventing malicious JavaScript payloads from being accepted and reflected.

prevent

Remediates the flaw in the Limit Bio WordPress plugin through timely patching to implement proper sanitization and escaping.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables network exploitation (T1190) and arbitrary JS execution leading to browser session hijacking (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Limit Bio WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Deeper analysisAI

CVE-2024-13884 is a reflected cross-site scripting (XSS) vulnerability affecting the Limit Bio WordPress plugin through version 1.0. The flaw arises because the plugin does not sanitize and escape a parameter before outputting it back in the page, enabling CWE-79: Improper Neutralization of Input During Web Page Generation. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility and scope change.

Unauthenticated attackers (PR:N) can exploit this over the network with low attack complexity, though it requires user interaction (UI:R). By crafting a malicious payload in the vulnerable parameter and tricking a high-privilege user, such as an admin, into accessing a malicious link or page, the attacker can execute arbitrary JavaScript in the victim's browser context. This may result in low-level impacts on confidentiality, integrity, and availability, such as session hijacking or unauthorized actions performed as the targeted user.

The WPScan advisory at https://wpscan.com/vulnerability/759a60ac-c890-4961-91e4-53db5096eb3c/ provides additional details on the vulnerability.

Details

CWE(s)

Affected Products

rivercitygraphix
limit bio
1.0

CVEs Like This One

CVE-2025-1436Same product: Rivercitygraphix Limit Bio
CVE-2025-22751Shared CWE-79
CVE-2026-30862Shared CWE-79
CVE-2025-23726Shared CWE-79
CVE-2025-67932Shared CWE-79
CVE-2025-28928Shared CWE-79
CVE-2025-23843Shared CWE-79
CVE-2025-68538Shared CWE-79
CVE-2025-27088Shared CWE-79
CVE-2025-23811Shared CWE-79

References