Authenticated Reflected Cross-Site Scripting in InfiniteWP Admin Panel

This is a security advisory for a vulnerability that has been assigned a CVE identifier but has not been publicly disclosed by the vendor. This information is intended for security researchers, system administrators, and the public to promote awareness and responsible disclosure.

Date of Announcement: September 29, 2025

Overview

A recently discovered vulnerability in the InfiniteWP Admin Panel, a popular tool for managing multiple WordPress sites, has been identified and assigned the CVE identifier CVE-2024-22505. This vulnerability is an authenticated reflected Cross-Site Scripting (XSS) flaw that could allow an attacker to execute malicious scripts within a user's browser.

Vulnerability Details

CVE ID CVE-2024-22505
Vulnerability Type Authenticated Reflected Cross-Site Scripting (XSS)
Affected Software InfiniteWP Admin Panel up to version 3.4.1
Vulnerable Path /lib/JqueryfileTree/connectors/jqueryFileTree.php
Vulnerable Parameter hostName

An authenticated attacker can craft a malicious POST request to the vulnerable path, injecting JavaScript code into the hostName parameter. When a legitimate user interacts with the compromised panel, the injected script executes in their browser context.

Impact

Successful exploitation of this vulnerability could lead to a range of malicious activities, including but not limited to:

  • Session Hijacking: Stealing session cookies to impersonate the user.
  • Data Theft: Exfiltrating sensitive information from the user's session.
  • Phishing: Redirecting users to malicious websites to capture credentials.
  • Malware Execution: Forcing the user's browser to download and execute malware.

Recommendations

As of the date of this announcement, the vendor has not released a patch to address this vulnerability. We strongly advise all users of the InfiniteWP Admin Panel to take the following precautions:

  • Monitor for Updates: Regularly check the official InfiniteWP website for security advisories and software updates.
  • Restrict Access: Limit access to the InfiniteWP Admin Panel to trusted IP addresses.
  • Web Application Firewall (WAF): Implement a WAF with rules to filter out malicious XSS payloads.

References


Disclaimer: This vulnerability announcement is provided for informational purposes only. The information contained herein is intended to help organizations and individuals protect their systems. We have made a good-faith effort to provide accurate and up-to-date information. However, we cannot guarantee the accuracy or completeness of this information. You should not act or refrain from acting based on this information without seeking professional advice. We disclaim all liability for any loss or damage arising from your use of or reliance on this information.

Comments

Popular posts from this blog

Tutorial: Build an AI Penetration Tester with Claude (MCP + Burp)

InfluxDB TCP 8086 (Default) — Authentication Bypass & Pentest Notes

Mastering PowerShell Execution Policy Bypass