First published: Fri Apr 19 2024(Updated: )
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 5.47.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Customer Reviews for WooCommerce Plugin | <=5.47.0 | |
WP Customer Reviews | <5.48.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3731 is classified as a high severity vulnerability due to its potential impact on website security.
To fix CVE-2024-3731, update the Customer Reviews for WooCommerce plugin to version 5.48.0 or later.
CVE-2024-3731 affects all versions of the Customer Reviews for WooCommerce plugin for WordPress up to and including version 5.47.0.
CVE-2024-3731 involves a Reflected Cross-Site Scripting vulnerability due to insufficient input sanitization and output escaping.
Yes, unauthenticated attackers can exploit CVE-2024-3731 to inject arbitrary web scripts into affected sites.