An advisory was issued a few vulnerability within the Buyer Critiques for WooCommerce plugin, which is put in on over 80,000 web sites. The plugin permits unauthenticated attackers to launch a saved cross-site scripting assault.
Buyer Critiques for WooCommerce Vulnerability
The Buyer Critiques for WooCommerce plugin permits customers to ship clients an electronic mail reminder to go away a evaluate and likewise affords different options designed to extend buyer engagement with a model.
Wordfence issued an advisory a few flaw within the plugin that makes it potential for attackers to inject scripts into net pages that execute at any time when a person visits the affected web page.
The exploit is because of a failure to “sanitize” inputs and “escape” outputs. Sanitizing inputs on this context is a fundamental WordPress safety measure that checks if uploaded knowledge conforms to anticipated sorts and removes harmful content material like scripts. Output escaping is one other safety measure that ensures any particular characters produced by the plugin aren’t executable.
In response to the official Wordfence advisory:
“The Buyer Critiques for WooCommerce plugin for WordPress is susceptible to Saved Cross-Web site Scripting through the ‘writer’ parameter in all variations as much as, and together with, 5.80.2 as a result of inadequate enter sanitization and output escaping. This makes it potential for unauthenticated attackers to inject arbitrary net scripts in pages that can execute at any time when a person accesses an injected web page.”
Customers of the plugin are suggested to replace to model 5.81.0 or newer model.
Featured Picture by Shutterstock/Sensible Eye