VYPR
Medium severity6.5NVD Advisory· Published Oct 17, 2024· Updated Apr 23, 2026

CVE-2024-49307

CVE-2024-49307

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpseek Admin Management Xtended admin-management-xtended allows Stored XSS.This issue affects Admin Management Xtended : from n/a through <= 2.4.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Admin Management Xtended plugin (≤2.4.6) allows attackers with contributor+ roles to inject malicious scripts, leading to redirects or ads on visitor pages.

Vulnerability

Overview

The WordPress Admin Management Xtended plugin versions 2.4.6 and earlier contain a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This allows malicious actors to inject arbitrary HTML and JavaScript into the plugin's output, which is later executed in the browsers of visitors.

Exploitation

Details

Exploitation requires a WordPress user role with at least Contributor-level privileges to submit crafted input. The vulnerability is triggered when a privileged user (e.g., admin) performs an action such as clicking a malicious link or visiting a specially crafted page, leading to the stored script being executed [1]. No authentication bypass or special network access is required beyond standard WordPress administration capabilities.

Impact

If successfully exploited, an attacker can inject malicious scripts that execute in the context of any visitor's browser. Common payloads include redirects to malicious sites, advertisements, or other HTML payloads [1]. This can lead to defacement of the site, loss of visitor trust, and potential credential harvesting if combined with social engineering.

Mitigation

The vendor released version 2.4.7 to fix the issue. Users are strongly advised to update to this version immediately, or enable auto-updates for vulnerable plugins if using Patchstack [1]. No workarounds have been published, and the vulnerability is considered low severity with low likelihood of exploitation, but updates are recommended as a precaution.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.