Reflected Cross-Site Scripting in WooCommerce Plugin by WordPress
CVE-2024-13868
Summary
The WooCommerce WordPress plugin, specifically versions up to 9.0.2, contains a vulnerability where a parameter is not properly sanitized or escaped prior to being displayed on the page. This oversight exposes high privilege users, such as administrators, to potential reflected cross-site scripting attacks. Such vulnerabilities can be exploited to execute malicious scripts in the context of the user's browser, potentially leading to significant security breaches.
Affected Version(s)
URL Shortener | Conversion Tracking | AB Testing | WooCommerce 0 <= 9.0.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved