Skip to main content

CVE-2023-4960: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wclovers WCFM Marketplace – Best Multivendor Marketplace for WooCommerce

Medium
VulnerabilityCVE-2023-4960cvecve-2023-4960cwe-79
Published: Thu Jan 11 2024 (01/11/2024, 08:33:09 UTC)
Source: CVE Database V5
Vendor/Project: wclovers
Product: WCFM Marketplace – Best Multivendor Marketplace for WooCommerce

Description

The WCFM Marketplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcfm_stores' shortcode in versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:42:43 UTC

Technical Analysis

CVE-2023-4960 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WCFM Marketplace plugin for WordPress, developed by wclovers. This plugin is widely used to enable multivendor marketplace functionality on WooCommerce-based e-commerce sites. The vulnerability exists in versions up to and including 3.6.2, specifically within the 'wcfm_stores' shortcode. The root cause is insufficient sanitization and output escaping of user-supplied attributes, allowing authenticated users with contributor-level or higher permissions to inject arbitrary JavaScript code into pages. Because this is a stored XSS, the malicious script is saved on the server and executed whenever any user accesses the compromised page. The CVSS 3.1 base score is 6.4 (medium severity), with the vector indicating network attack vector, low attack complexity, privileges required at the low level (contributor), no user interaction needed, and a scope change. The impact includes partial confidentiality and integrity loss, as attackers can execute scripts in the context of other users, potentially stealing session tokens, performing actions on behalf of users, or defacing content. No known exploits are reported in the wild yet. The vulnerability affects all versions of the plugin up to 3.6.2, and no official patch links are provided in the data, indicating that users should monitor vendor advisories for updates or apply manual mitigations.

Potential Impact

For European organizations operating WooCommerce sites with the WCFM Marketplace plugin, this vulnerability poses a significant risk to the integrity and confidentiality of their e-commerce platforms. Attackers with contributor-level access—often users who can add or edit content but are not full administrators—can inject malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, unauthorized actions such as changing product listings or prices, theft of customer data, or distribution of malware to end users. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs) in retail and services, exploitation could damage brand reputation, cause financial loss, and violate GDPR requirements for data protection. The lack of user interaction for exploitation increases the risk, as scripts execute automatically when pages are viewed. However, the requirement for contributor-level privileges somewhat limits the attack surface to insiders or compromised accounts.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the WCFM Marketplace plugin. Until an official patch is released, administrators should restrict contributor-level permissions to trusted users only and consider temporarily disabling the 'wcfm_stores' shortcode if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide additional protection. Regularly monitoring logs for unusual contributor activity and scanning site content for injected scripts is advised. Organizations should also educate content contributors about secure input practices and enforce strong authentication mechanisms to reduce the risk of account compromise. Once a vendor patch is available, prompt application is critical. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-09-14T14:25:20.291Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e660d

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 4:42:43 PM

Last updated: 7/29/2025, 12:39:02 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats