First published: Sat Mar 01 2025(Updated: )
The SKU Generator for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WooCommerce SKU Generator | <=1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9212 is classified as a high severity vulnerability due to the potential for unauthenticated XSS attacks.
To fix CVE-2024-9212, update the SKU Generator for WooCommerce plugin to version 1.6.3 or later.
CVE-2024-9212 can facilitate reflected cross-site scripting (XSS) attacks, allowing attackers to execute arbitrary scripts in users' browsers.
All versions of the SKU Generator for WooCommerce up to and including 1.6.2 are affected by CVE-2024-9212.
CVE-2024-9212 can be exploited by unauthenticated attackers, making it particularly dangerous.