CVE-2024-9451
Description
The Embed PDF Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'height' and 'width' parameters in all versions up to, and including, 2.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Embed PDF Viewer plugin for WordPress up to v2.4.4 has a stored XSS vulnerability via unsanitized height and width parameters, exploitable by authenticated users with Contributor-level access.
Vulnerability
Overview
The Embed PDF Viewer plugin for WordPress, in all versions up to and including 2.4.4, is vulnerable to Stored Cross-Site Scripting (XSS). The vulnerability stems from insufficient input sanitization and output escaping on the 'height' and 'width' parameters used in the plugin's shortcode or block. This allows authenticated attackers to inject arbitrary web scripts that become stored and executed whenever a user accesses the affected page.
Exploitation
Prerequisites
To exploit this vulnerability, an attacker must have at least Contributor-level access to a WordPress site. The attacker can craft a post or page containing the Embed PDF Viewer block or shortcode with malicious JavaScript payloads embedded in the 'height' or 'width' attributes. When an administrator or other user views the injected page, the script executes in their browser within the context of the site.
Impact
Successful exploitation enables the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, defacing pages, or performing other actions that the victim user can do. The injected script runs in the context of the victim's session, potentially leading to full site compromise if an administrator views the page.
Mitigation
As of the publication date, a patched version has not been released. Users are advised to either update the plugin once a fix is available or consider disabling the plugin until a security update is issued. The plugin is open source and maintained on GitHub, so contributors may address the issue in a future release. [1]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.4.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/embed-pdf-viewer/trunk/embed-pdf-viewer.phpnvd
- plugins.trac.wordpress.org/browser/embed-pdf-viewer/trunk/embed-pdf-viewer.phpnvd
- plugins.trac.wordpress.org/changeset/3164573/nvd
- wordpress.org/plugins/embed-pdf-viewer/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/b616e275-855d-461e-8fcb-c96098e41dfdnvd
News mentions
0No linked articles in our index yet.