CVE-2024-31111
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated, stored XSS vulnerability in WordPress core 6.5 through 5.9 allows high-privileged users to inject arbitrary scripts via crafted template parts.
Root
Cause CVE-2024-31111 is a stored cross-site scripting (XSS) vulnerability in WordPress core, affecting versions 6.0 through 6.5.4, 5.9 through 5.9.9, and their corresponding branches. The flaw lies in improper neutralization of input during web page generation, specifically within the template part system. This allows elevated users (e.g., administrators) to inject malicious scripts that persist on the server and execute in visitors' browsers [1].
Exploitation
Exploitation requires a privileged user—such as an editor or administrator—to create or modify a template part containing crafted input. The attacker must already have at least Author-level access. While no direct user interaction is needed beyond the initial malicious content creation, the injected script executes when any visitor loads a page that uses the compromised template part [1]. The attack vector is network-based, with low attack complexity and low privileges required.
Impact
Successful exploitation enables an attacker to inject arbitrary HTML and JavaScript into affected WordPress pages. This can lead to redirects, injected advertisements, data exfiltration, or further compromise of the site (e.g., privilege escalation or session hijacking) when visitors execute the payload [1]. The CVSS v3 base score of 6.5 reflects medium severity, with the primary impacts on integrity and availability (partial, low).
Mitigation
The vulnerability has been patched in WordPress version 6.5.5. Users on any affected branch should update immediately. There is no known evidence of mass exploitation reported in the advisory, but given the widespread use of WordPress, prompt patching is recommended. No workarounds are detailed; updating to the latest version is the only complete fix [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3- Range: >=5.9,<5.9.10 || >=6.0,<6.0.9 || >=6.1,<6.1.7 || >=6.2,<6.2.6 || >=6.3,<6.3.5 || >=6.4,<6.4.5 || >=6.5,<6.5.5
- osv-coords2 versions
>= 5.9.0, < 5.9.10+ 1 more
- (no CPE)range: >= 5.9.0, < 5.9.10
- (no CPE)range: >= 5.9.0, < 5.9.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.