CVE-2024-13515
Description
The Image Source Control Lite – Show Image Credits and Captions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'path' parameter in all versions up to, and including, 2.28.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Image Source Control Lite plugin ≤2.28.0 has a reflected XSS via the 'path' parameter, allowing unauthenticated attackers to inject arbitrary scripts.
The Image Source Control Lite – Show Image Credits and Captions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in all versions up to and including 2.28.0. The vulnerability exists because the plugin passes the unsanitized 'path' parameter from the URL directly into an iframe src attribute on the settings preview page, allowing an attacker to inject arbitrary JavaScript. The insufficient input sanitization and output escaping makes it possible for unauthenticated attackers to craft a malicious link that, when clicked by a logged-in administrator, will execute the attacker's script in the context of the WordPress admin panel [1].
The attack surface is low complexity: the attacker does not need any authentication, and the only user interaction required is a click on a crafted link. The malicious 'path' parameter is included in the iframe's source URL, which loads a separate HTML page that then uses the value to construct a script element's source. The commit that fixes the issue removes the 'path' parameter entirely and uses a hardcoded relative path instead [1].
If exploited, an attacker could execute arbitrary web scripts in the browser of an administrator who clicks the malicious link. This could lead to theft of cookies, session tokens, or other sensitive information, as well as performing actions on behalf of the admin, such as modifying plugin settings or creating new administrative users. The impact is limited by the need for social engineering, but the lack of authentication requirements lowers the barrier for attackers.
A patch was released in version 2.29.0, which completely removes the 'path' parameter from the iframe URL and hardcodes the script source to a relative path that cannot be manipulated by an attacker. Users are strongly advised to update to the latest version. No known workarounds are available for previous versions beyond applying the patch.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
1d1461b886ed2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.