ShopLentor Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting via woolentorsearch Shortcode – CVE-2024-3345 | WordPress Plugin Vulnerability Report

Plugin Name: ShopLentor

Key Information:

  • Software Type: Plugin
  • Software Slug: woolentor-addons
  • Software Status: Active
  • Software Author: devitemsllc
  • Software Downloads: 3,557,867
  • Active Installs: 100,000
  • Last Updated: May 20, 2024
  • Patched Versions: 2.8.9
  • Affected Versions: <= 2.8.8

Vulnerability Details:

  • Name: ShopLentor <= 2.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via woolentorsearch Shortcode
  • Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CVE: CVE-2024-3345
  • CVSS Score: 6.4 (Medium)
  • Publicly Published: May 20, 2024
  • Researcher: wesley (wcraft)
  • Description: The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woolentorsearch shortcode in all versions up to, and including, 2.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Summary:

he ShopLentor plugin for WordPress has a vulnerability in versions up to and including 2.8.8 that allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts via the woolentorsearch shortcode due to insufficient input sanitization and output escaping. This vulnerability has been patched in version 2.8.9.

Detailed Overview:

The ShopLentor plugin for WordPress, in versions up to and including 2.8.8, is vulnerable to Stored Cross-Site Scripting (XSS) attacks. The vulnerability was discovered by researcher wesley (wcraft) and publicly disclosed on May 20, 2024. It allows authenticated attackers with contributor-level access and above to inject malicious scripts into pages using the woolentorsearch shortcode. The lack of proper input sanitization and output escaping on user-supplied attributes enables the injection of arbitrary web scripts, which will execute whenever a user accesses an infected page. This vulnerability poses a significant risk, as it can be exploited to steal sensitive user information, perform unauthorized actions, or deface the website.

Advice for Users:

  1. Immediate Action: Update the ShopLentor plugin to version 2.8.9 or later to ensure protection against this vulnerability.
  2. Check for Signs of Vulnerability: Review your website's pages, especially those containing the woolentorsearch shortcode, for any suspicious or unauthorized content that may indicate a successful exploitation of this vulnerability.
  3. Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
  4. Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.

The prompt response from the ShopLentor plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.8.9 or later to secure their WordPress installations. This vulnerability is one of 13 that have been discovered in the ShopLentor plugin since April 2021, highlighting the ongoing need for vigilance and regular updates to maintain website security.

References:

Detailed Report: 

As a website owner, your top priority is ensuring the safety and security of your site and its users. However, even with the best intentions, vulnerabilities can slip through the cracks, putting your website at risk. In today's digital landscape, keeping your WordPress plugins up to date is more crucial than ever. A recent discovery of a severe vulnerability in the popular ShopLentor plugin has once again highlighted the importance of regular updates and the potential consequences of neglecting them.

Plugin Details

ShopLentor is a popular WordPress plugin used by over 100,000 active websites. It is designed to enhance the functionality of WooCommerce, a widely-used e-commerce platform for WordPress. The plugin offers various features such as custom product templates, ajax search, product filter, wishlist, product comparison, and more. With over 3.5 million downloads, ShopLentor has become a go-to solution for many online store owners.

Vulnerability Details

The ShopLentor plugin, in versions up to and including 2.8.8, has been found to have a critical vulnerability that allows attackers to inject malicious scripts into your website. This vulnerability, identified as CVE-2024-3345, is caused by insufficient input sanitization and output escaping on user-supplied attributes in the woolentorsearch shortcode. As a result, authenticated attackers with contributor-level access and above can inject arbitrary web scripts into pages, which will execute whenever a user accesses an infected page.

Risks and Potential Impacts

The ShopLentor vulnerability poses significant risks to websites using the affected versions of the plugin. If exploited, attackers can steal sensitive user information, perform unauthorized actions, or deface the website. This can lead to a loss of trust from your customers, damage to your brand reputation, and potential financial losses. In some cases, attackers may even use the vulnerability to gain further access to your website or server, compromising the security of your entire online presence.

Remediating the Vulnerability

To protect your website from the ShopLentor vulnerability, it is crucial to take immediate action. The first step is to update the ShopLentor plugin to version 2.8.9 or later, which includes a patch for this vulnerability. If you are unsure about updating the plugin yourself, contact your website developer or a security professional for assistance.

After updating the plugin, it is recommended to review your website's pages, especially those containing the woolentorsearch shortcode, for any suspicious or unauthorized content that may indicate a successful exploitation of the vulnerability.

Previous Vulnerabilities

The ShopLentor plugin has had a history of security issues, with 13 vulnerabilities discovered since April 2021. This highlights the importance of staying vigilant and regularly updating your plugins to ensure your website's security.

The Importance of Staying on Top of Security Vulnerabilities

As a small business owner, managing a website can be overwhelming, especially when it comes to staying on top of security vulnerabilities. However, neglecting website security can have severe consequences for your business. By regularly updating your WordPress plugins and core installation, monitoring your website for suspicious activity, and partnering with security professionals, you can significantly reduce the risk of falling victim to cyber threats.

If you're concerned about the security of your website or unsure about how to proceed, don't hesitate to seek help from experts. Many security companies and WordPress professionals offer services tailored to small businesses, helping you maintain a secure and reliable online presence without the need for extensive technical knowledge or resources.

Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.

Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.

ShopLentor Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting via woolentorsearch Shortcode – CVE-2024-3345 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment