First published: Sun May 28 2023(Updated: )
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Follow-Up Emails (AutomateWoo) plugin <= 4.9.40 versions.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Woocommerce Automatewoo | <=4.9.40 |
Update to 4.9.50 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-33319 is medium with a CVSS score of 6.1.
The affected software for CVE-2023-33319 is WooCommerce WooCommerce Follow-Up Emails (AutomateWoo) plugin versions <= 4.9.40.
CVE-2023-33319 allows unauthenticated attackers to inject and execute malicious JavaScript code on your website through reflected cross-site scripting (XSS) attacks.
Yes, a fix is available for CVE-2023-33319. Users should update to WooCommerce Follow-Up Emails (AutomateWoo) plugin version 4.9.41 or later to mitigate the vulnerability.
CWE-79 is a common weakness enumeration category for cross-site scripting (XSS) vulnerabilities.