CVE-2024-13884
Published: 13 March 2025
Summary
CVE-2024-13884 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Rivercitygraphix Limit Bio. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates reflected XSS by filtering and encoding plugin output to neutralize malicious scripts in the unsanitized parameter.
Validates user inputs to the plugin parameter, preventing malicious JavaScript payloads from being accepted and reflected.
Remediates the flaw in the Limit Bio WordPress plugin through timely patching to implement proper sanitization and escaping.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin enables network exploitation (T1190) and arbitrary JS execution leading to browser session hijacking (T1185).
NVD Description
The Limit Bio WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Deeper analysisAI
CVE-2024-13884 is a reflected cross-site scripting (XSS) vulnerability affecting the Limit Bio WordPress plugin through version 1.0. The flaw arises because the plugin does not sanitize and escape a parameter before outputting it back in the page, enabling CWE-79: Improper Neutralization of Input During Web Page Generation. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility and scope change.
Unauthenticated attackers (PR:N) can exploit this over the network with low attack complexity, though it requires user interaction (UI:R). By crafting a malicious payload in the vulnerable parameter and tricking a high-privilege user, such as an admin, into accessing a malicious link or page, the attacker can execute arbitrary JavaScript in the victim's browser context. This may result in low-level impacts on confidentiality, integrity, and availability, such as session hijacking or unauthorized actions performed as the targeted user.
The WPScan advisory at https://wpscan.com/vulnerability/759a60ac-c890-4961-91e4-53db5096eb3c/ provides additional details on the vulnerability.
Details
- CWE(s)