First published: Thu Apr 04 2024(Updated: )
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slitems parameter in the WL Special Day Offer Widget in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ShopLentor | <=2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2868 is classified as a Stored Cross-Site Scripting vulnerability, which can allow attackers to execute malicious scripts in the context of users' sessions.
To fix CVE-2024-2868, update the ShopLentor – WooCommerce Builder for Elementor & Gutenberg plugin to version 2.8.4 or later.
CVE-2024-2868 affects users of the ShopLentor – WooCommerce Builder for Elementor & Gutenberg plugin versions 2.8.3 and below.
The impact of CVE-2024-2868 includes potential unauthorized access to user data through malicious script execution.
Yes, CVE-2024-2868 is a widespread issue due to the popularity of the ShopLentor plugin among WordPress users.