XSS Vulnerability Discovered In YITH WooCommerce Ajax Product Filter WordPress Plugin

One more WordPress plugin potentially risked the security of over 100,000 websites due to a security flaw. Reportedly, a serious cross-site scripting (XSS) vulnerability existed in the YITH WooCommerce Ajax Product Filter WordPress plugin. Exploiting this vulnerability could allow an attacker to execute malicious scripts on the target website.

YITH WooCommerce Ajax Product Filter Plugin Flaw

Researchers from Sucuri shared details of their findings regarding a security flaw in the YITH WooCommerce Ajax Product Filter plugin.

As stated in their post, an XSS vulnerability affected the plugin which could let an attacker execute malicious scripts. The bug developed because the plugin lacked proper sanitization of user input. Therefore, an attacker could exploit the victim’s user account to execute different malicious actions on the site.

Although, successful exploitation of the vulnerability essentially required user interaction. Moreover, an attacker could only execute malicious scripts in the context of the current user.

However, things would become serious if the target account has admin rights to the site.

Describing the vulnerability in their post, the researchers stated,

By exploiting this vulnerability, an attacker can perform requests to add unwanted spam content or execute other malicious actions asynchronously based on the privilege level of the victim.

Patch Rolled Out

According to the details shared, this was a medium severity bug that received a severity score of 6.

Upon discovering the flaw, the researchers reached out to the developers of the respective plugin to address the issue.

Consequently, the developers fixed the bug with the release of YITH WooCommerce Ajax Product Filter plugin version 3.11.1.

Now that the update is out, users must ensure updating their websites to the latest plugin version to stay safe.

Earlier this month, hackers exploited XSS vulnerability in WordPress plugins to target over a million websites in an attempt to harvest their database credentials.

Let us know your thoughts in the comments.

Related posts

Water Facilities Must Secure Exposed HMIs – Warns CISA

Microsoft December Patch Tuesday Arrived With 70+ Bug Fixes

NachoVPN Attack Risks Corporate VPN Clients