VYPR
Medium severity6.1NVD Advisory· Published Dec 7, 2024· Updated Apr 15, 2026

CVE-2024-11464

CVE-2024-11464

Description

The Easy Code Snippets plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Easy Code Snippets WordPress plugin (≤1.0.2) via unsanitized 'page' parameter allows unauthenticated attackers to inject arbitrary web scripts.

Vulnerability

Description

The Easy Code Snippets plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in all versions up to and including 1.0.2 [1]. The vulnerability exists because the plugin fails to properly sanitize and escape the 'page' parameter before outputting it in the admin interface, allowing unauthenticated attackers to inject arbitrary JavaScript or HTML into the application's response [1].

Exploitation

Method

An attacker can exploit this flaw by crafting a malicious URL containing a specially crafted 'page' parameter. No authentication is required to trigger the vulnerability, but successful exploitation depends on social engineering—the victim must click a crafted link (e.g., in a phishing email or on a third-party site) [1]. The injected script then executes in the context of the victim's WordPress admin session.

Impact

Successful exploitation enables an attacker to perform actions such as stealing session cookies, modifying page content, or redirecting the victim to malicious sites. Because the plugin is typically used to manage code snippets, an attacker could also potentially escalate privileges if the victim is an administrator, leading to full site compromise.

Mitigation

The plugin was closed on December 6, 2024, and is no longer available for download due to this security issue [1]. Users who have installed version 1.0.2 or earlier should immediately remove or disable the plugin. No patch is available; the vendor recommended action is to switch to an alternative code-snippets solution.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.