Skip to main content

CVE-2022-4000: CWE-79 Cross-Site Scripting (XSS) in Unknown WooCommerce Shipping

Medium
Published: Mon Dec 12 2022 (12/12/2022, 17:54:56 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WooCommerce Shipping

Description

The WooCommerce Shipping WordPress plugin through 1.2.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 06/21/2025, 18:24:12 UTC

Technical Analysis

CVE-2022-4000 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WooCommerce Shipping WordPress plugin, affecting versions through 1.2.11. The root cause of the vulnerability lies in the plugin's failure to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8 (medium severity), with the vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires high privileges, and user interaction is needed. The scope is changed (S:C), indicating the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. There are no known exploits in the wild, and no official patches or mitigation links have been provided as of the published date (December 2022). The vulnerability is particularly concerning in multisite WordPress installations where administrators may be restricted from posting unfiltered HTML but can still exploit this XSS vector, potentially leading to session hijacking, privilege escalation, or further compromise through malicious script execution in the context of other administrators or users with elevated privileges.

Potential Impact

For European organizations using WooCommerce Shipping plugin, especially those operating multisite WordPress environments, this vulnerability poses a risk of persistent XSS attacks that can compromise administrative sessions and integrity of the site. Attackers with administrative privileges could inject malicious scripts that execute in the browsers of other administrators or privileged users, potentially leading to credential theft, unauthorized actions, or deployment of further malware. This could result in data breaches, defacement, or disruption of e-commerce operations. Given WooCommerce's popularity in European e-commerce, especially among small to medium enterprises, exploitation could undermine customer trust and lead to regulatory consequences under GDPR if personal data is compromised. The medium CVSS score reflects limited impact on availability but highlights the risk to confidentiality and integrity. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple administrators or less stringent internal controls.

Mitigation Recommendations

1. Immediate review and restriction of administrative privileges within WordPress multisite environments to minimize the number of users who can modify plugin settings. 2. Implement strict input validation and sanitization on all plugin settings fields, either by applying custom filters or using security plugins that enforce content sanitization. 3. Monitor and audit changes to WooCommerce Shipping plugin settings for suspicious or unexpected modifications. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 5. Regularly update WooCommerce Shipping plugin once an official patch is released; in the meantime, consider disabling or limiting the use of the plugin if feasible. 6. Educate administrators about the risks of stored XSS and encourage cautious behavior when modifying plugin settings. 7. Use security plugins that detect and block XSS payloads or anomalous admin activity. 8. For multisite setups, consider isolating critical sites or limiting plugin usage to reduce the attack surface. These steps go beyond generic advice by focusing on administrative privilege management, monitoring, and layered defenses specific to the plugin's configuration and multisite context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-15T14:56:32.112Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7347

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 6:24:12 PM

Last updated: 7/31/2025, 9:59:36 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats