tarteaucitron.js for WordPress Vulnerability (Medium) – CVE-2024-11719

tarteaucitron.js for WordPress Vulnerability (Medium) – CVE-2024-11719

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2024-11719 affects the tarteaucitron.js for WordPress plugin (tarteaucitron-wp) in versions before 0.3.0. It is rated Medium severity (CVSS 6.1).

The primary attack path is a forged request (Cross-Site Request Forgery) that relies on user interaction. An unauthenticated attacker would need to trick a site administrator into clicking a link or taking an action while logged into WordPress. If successful, the attacker can push unauthorized settings changes and potentially inject malicious scripts that become stored and served to site visitors.

Reference: CVE record and advisory source: Wordfence vulnerability details.

Security Weakness

The issue stems from missing or incorrect nonce validation in a plugin function, which weakens WordPress’s built-in protections intended to ensure that sensitive administrative actions are intentional and authorized.

Because the weakness enables both Cross-Site Request Forgery and a follow-on stored Cross-Site Scripting (XSS) outcome (via settings changes and script injection), the risk is not limited to internal admin users—site visitors can be exposed if malicious code is stored and rendered on public pages.

Remediation: Update tarteaucitron.js for WordPress to version 0.3.0 or newer (patched) as advised by the vendor/community source.

Technical or Business Impacts

Brand and customer trust risk: Stored XSS can cause unexpected pop-ups, redirects, or content injections that degrade user experience and damage credibility—especially on high-visibility marketing pages and campaign landing pages.

Lead-generation and revenue impact: If malicious scripts run in visitors’ browsers, they may interfere with forms, analytics, tag management, or checkout flows. Even intermittent issues can reduce conversion rates and compromise campaign attribution.

Compliance and legal exposure: Injected scripts can potentially alter consent experiences and site content in ways that create policy violations or audit findings. For Compliance teams, this is a governance concern because the change is made through an administrator’s session, potentially blurring accountability without strong logging and change control.

Operational impact: Incident response often involves emergency plugin updates, site scans, stakeholder communications, and validation across pages and templates—pulling time away from marketing operations and executive priorities.

Similar attacks: CSRF and stored-XSS chains are a recurring pattern in web and WordPress ecosystems. Examples include CVE-2023-28432 (MinIO Console – XSS), CVE-2022-35914 (Grafana – stored XSS), and CVE-2021-44228 (Log4Shell – broad web-app compromise impact).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers