CVE-2022-4000: CWE-79 Cross-Site Scripting (XSS) in Unknown WooCommerce Shipping
The WooCommerce Shipping WordPress plugin through 1.2.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2022-4000 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WooCommerce Shipping WordPress plugin, affecting versions through 1.2.11. The root cause of the vulnerability lies in the plugin's failure to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8 (medium severity), with the vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires high privileges, and user interaction is needed. The scope is changed (S:C), indicating the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. There are no known exploits in the wild, and no official patches or mitigation links have been provided as of the published date (December 2022). The vulnerability is particularly concerning in multisite WordPress installations where administrators may be restricted from posting unfiltered HTML but can still exploit this XSS vector, potentially leading to session hijacking, privilege escalation, or further compromise through malicious script execution in the context of other administrators or users with elevated privileges.
Potential Impact
For European organizations using WooCommerce Shipping plugin, especially those operating multisite WordPress environments, this vulnerability poses a risk of persistent XSS attacks that can compromise administrative sessions and integrity of the site. Attackers with administrative privileges could inject malicious scripts that execute in the browsers of other administrators or privileged users, potentially leading to credential theft, unauthorized actions, or deployment of further malware. This could result in data breaches, defacement, or disruption of e-commerce operations. Given WooCommerce's popularity in European e-commerce, especially among small to medium enterprises, exploitation could undermine customer trust and lead to regulatory consequences under GDPR if personal data is compromised. The medium CVSS score reflects limited impact on availability but highlights the risk to confidentiality and integrity. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple administrators or less stringent internal controls.
Mitigation Recommendations
1. Immediate review and restriction of administrative privileges within WordPress multisite environments to minimize the number of users who can modify plugin settings. 2. Implement strict input validation and sanitization on all plugin settings fields, either by applying custom filters or using security plugins that enforce content sanitization. 3. Monitor and audit changes to WooCommerce Shipping plugin settings for suspicious or unexpected modifications. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 5. Regularly update WooCommerce Shipping plugin once an official patch is released; in the meantime, consider disabling or limiting the use of the plugin if feasible. 6. Educate administrators about the risks of stored XSS and encourage cautious behavior when modifying plugin settings. 7. Use security plugins that detect and block XSS payloads or anomalous admin activity. 8. For multisite setups, consider isolating critical sites or limiting plugin usage to reduce the attack surface. These steps go beyond generic advice by focusing on administrative privilege management, monitoring, and layered defenses specific to the plugin's configuration and multisite context.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-4000: CWE-79 Cross-Site Scripting (XSS) in Unknown WooCommerce Shipping
Description
The WooCommerce Shipping WordPress plugin through 1.2.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2022-4000 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WooCommerce Shipping WordPress plugin, affecting versions through 1.2.11. The root cause of the vulnerability lies in the plugin's failure to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 4.8 (medium severity), with the vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires high privileges, and user interaction is needed. The scope is changed (S:C), indicating the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. There are no known exploits in the wild, and no official patches or mitigation links have been provided as of the published date (December 2022). The vulnerability is particularly concerning in multisite WordPress installations where administrators may be restricted from posting unfiltered HTML but can still exploit this XSS vector, potentially leading to session hijacking, privilege escalation, or further compromise through malicious script execution in the context of other administrators or users with elevated privileges.
Potential Impact
For European organizations using WooCommerce Shipping plugin, especially those operating multisite WordPress environments, this vulnerability poses a risk of persistent XSS attacks that can compromise administrative sessions and integrity of the site. Attackers with administrative privileges could inject malicious scripts that execute in the browsers of other administrators or privileged users, potentially leading to credential theft, unauthorized actions, or deployment of further malware. This could result in data breaches, defacement, or disruption of e-commerce operations. Given WooCommerce's popularity in European e-commerce, especially among small to medium enterprises, exploitation could undermine customer trust and lead to regulatory consequences under GDPR if personal data is compromised. The medium CVSS score reflects limited impact on availability but highlights the risk to confidentiality and integrity. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple administrators or less stringent internal controls.
Mitigation Recommendations
1. Immediate review and restriction of administrative privileges within WordPress multisite environments to minimize the number of users who can modify plugin settings. 2. Implement strict input validation and sanitization on all plugin settings fields, either by applying custom filters or using security plugins that enforce content sanitization. 3. Monitor and audit changes to WooCommerce Shipping plugin settings for suspicious or unexpected modifications. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 5. Regularly update WooCommerce Shipping plugin once an official patch is released; in the meantime, consider disabling or limiting the use of the plugin if feasible. 6. Educate administrators about the risks of stored XSS and encourage cautious behavior when modifying plugin settings. 7. Use security plugins that detect and block XSS payloads or anomalous admin activity. 8. For multisite setups, consider isolating critical sites or limiting plugin usage to reduce the attack surface. These steps go beyond generic advice by focusing on administrative privilege management, monitoring, and layered defenses specific to the plugin's configuration and multisite context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-15T14:56:32.112Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7347
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 6:24:12 PM
Last updated: 7/31/2025, 9:59:36 PM
Views: 10
Related Threats
CVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.