YITH WooCommerce Wishlist Vulnerability – Authenticated (Admin+) Stored Cross-Site Scripting – CVE-2024-34385 | WordPress Plugin Vulnerability Report

Plugin Name: YITH WooCommerce Wishlist

Key Information:

  • Software Type: Plugin
  • Software Slug: yith-woocommerce-wishlist
  • Software Status: Active
  • Software Author: yithemes
  • Software Downloads: 25,691,780
  • Active Installs: 900,000
  • Last Updated: June 11, 2024
  • Patched Versions: 3.33.0
  • Affected Versions: <= 3.32.0

Vulnerability Details:

  • Name: YITH WooCommerce Wishlist <= 3.32.0
  • Title: Authenticated (Admin+) Stored Cross-Site Scripting
  • Type:
  • CVE: CVE-2024-34385
  • CVSS Score: 4.4
  • Publicly Published: May 30, 2024
  • Researcher: Phill Sav (Savphill)
  • Description: The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to 3.33.0 (exclusive) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
  • References: Wordfence Report

Summary:

The YITH WooCommerce Wishlist plugin for WordPress has a vulnerability in versions up to 3.32.0 that allows authenticated administrators to execute Stored Cross-Site Scripting attacks via admin settings. This vulnerability has been patched in version 3.33.0.

Detailed Overview:

The vulnerability, reported by Phill Sav (Savphill), arises from inadequate input sanitization and output escaping in the plugin's admin settings. Authenticated attackers with administrator-level permissions and above can exploit this vulnerability to inject arbitrary web scripts into pages, potentially compromising website integrity and user security.

Advice for Users:

  • Immediate Action: Users are strongly encouraged to update to patched version 3.33.0 immediately to mitigate the risk of exploitation.
  • Check for Signs of Vulnerability: Regularly monitor websites for any unusual behavior, such as unexpected popups or redirects, which may indicate exploitation of the vulnerability.
  • Alternate Plugins: While awaiting the patch, consider disabling the YITH WooCommerce Wishlist plugin or exploring alternative wishlist plugins to minimize the risk of vulnerability exploitation.
  • Stay Updated: Always ensure that plugins are updated to their latest versions to prevent vulnerabilities and maintain the security of WordPress installations.

Conclusion:

The prompt response from the plugin developers in releasing a patch underscores the importance of timely updates for maintaining website security. Users are advised to ensure that they are running version 3.33.0 or later to secure their WordPress installations against potential exploits.

References:

Detailed Report: 

Introduction:

In today's digital landscape, the security of your website is paramount. From personal blogs to e-commerce platforms, ensuring that your online presence is safeguarded against potential threats is essential. That's why we're highlighting a critical security issue with the YITH WooCommerce Wishlist plugin. This vulnerability, known as Authenticated (Admin+) Stored Cross-Site Scripting, poses a significant risk to WordPress websites running versions up to 3.32.0.

Risks/Potential Impacts of the Vulnerability:

The vulnerability, reported by Phill Sav (Savphill), arises from inadequate input sanitization and output escaping in the plugin's admin settings. Authenticated attackers with administrator-level permissions and above can exploit this vulnerability to inject arbitrary web scripts into pages, potentially compromising website integrity and user security.

Overview of Previous Vulnerabilities:

There have been 4 previous vulnerabilities since January 16, 2018.

Conclusion:

Small business owners with WordPress websites, often juggling multiple responsibilities, must prioritize staying on top of security vulnerabilities. Proactive measures such as regular updates, monitoring for signs of compromise, and considering alternative plugins can help fortify their online presence and protect against potential threats. By remaining vigilant and taking proactive steps, small business owners can safeguard their websites and focus on their core operations without the worry of security breaches.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

YITH WooCommerce Wishlist Vulnerability – Authenticated (Admin+) Stored Cross-Site Scripting – CVE-2024-34385 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment