Cross-Site Scripting (XSS) Affecting woocommerce/woocommerce package, versions >=8.8.0, <8.8.5>=8.9.0, <8.9.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-Site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-WOOCOMMERCEWOOCOMMERCE-7251660
  • published13 Jun 2024
  • disclosed12 Jun 2024
  • creditUnknown

Introduced: 12 Jun 2024

CVE-2024-37297  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade woocommerce/woocommerce to version 8.8.5, 8.9.3 or higher.

Overview

woocommerce/woocommerce is an eCommerce toolkit that helps you sell anything.

Affected versions of this package are vulnerable to Cross-Site Scripting (XSS) due to the URL content being read through the Sourcebuster.js library and then being inserted without proper sanitization to the classic checkout and registration forms. A bad actor can manipulate a link to include malicious HTML & JavaScript content. The links may be sent to victims for malicious purposes, then the injected JavaScript could hijack content & data stored in the browser, including the session.

Workaround

This vulnerability can be mitigated by disabling the Order Attribution feature.

CVSS Scores

version 4.0
version 3.1