First published: Thu Jun 06 2024(Updated: )
The SellKit – Funnel builder and checkout optimizer for WooCommerce to sell more, faster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artbees SellKit | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4608 is classified as a high severity vulnerability due to its risk of stored cross-site scripting.
To remediate CVE-2024-4608, update the SellKit plugin to version 2.0.0 or later to ensure proper input sanitization.
CVE-2024-4608 affects all versions of the SellKit plugin up to and including version 1.9.8.
CVE-2024-4608 is a stored cross-site scripting (XSS) vulnerability found in the SellKit plugin for WordPress.
Exploitation of CVE-2024-4608 can allow attackers to inject malicious scripts, potentially compromising user data.