CVE-2024-4455 Scanner
CVE-2024-4455 Scanner - Cross-Site Scripting (XSS) vulnerability in YITH WooCommerce Ajax Search
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
12 days 19 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
The YITH WooCommerce Ajax Search plugin is a popular tool used by online retailers who operate WordPress sites to enhance the search experience for their customers. Developed by YITH Themes, this plugin allows users to search products instantly via an AJAX-powered search box, providing quick and relevant results. It is widely employed by e-commerce businesses to improve user experience and increase sales conversion rates. The plugin is regularly updated to offer new features and security improvements. Users range from small business owners to large online retailers who require efficient search capabilities on their WordPress WooCommerce websites.
Cross-Site Scripting (XSS) is a vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. In the context of the YITH WooCommerce Ajax Search plugin, the vulnerability arises due to insufficient input sanitization and output escaping in the REST API. This flaw enables attackers to execute arbitrary scripts in the browsers of users who interact with the affected component. XSS vulnerabilities can lead to session hijacking, defacement of websites, and unauthorized actions being performed on behalf of the users. Its exploitation doesn't require user authentication, making it particularly dangerous.
The vulnerability resides in the 'queryString' parameter of the REST API endpoint /ywcas/v1/register. In this particular instance, the lack of proper input validation allows the injection of JavaScript code, which can be executed in the context of users visiting the affected endpoint. Attackers could exploit this by crafting specific URL requests that include script payloads. Unsuspecting users who execute these URLs can have scripts run on their browsers, leading to potential data theft or user impersonation. The vulnerability is present in versions up to and including 2.4.0 of the plugin.
Exploiting this vulnerability could have several harmful effects. Malicious actors could inject scripts that steal session cookies, leading to account breaches and unauthorized access to user data. Attackers could deface web pages, redirect users to malicious websites, or distribute malware through crafted scripts. XSS vulnerabilities can also facilitate phishing attacks, where users are tricked into entering sensitive information on fraudulent pages. The reputation of affected websites may suffer, leading to a loss of customer trust and potential legal implications for failing to protect user data.
REFERENCES
- https://nvd.nist.gov/vuln/detail/CVE-2024-4455
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0f5fd4-cd06-4d11-9f22-1f417b546afb
- https://patchstack.com/database/vulnerability/yith-woocommerce-ajax-search/wordpress-yith-woocommerce-ajax-search-plugin-2-4-0-unauthenticated-stored-cross-site-scripting-vulnerability