CVE-2023-4960: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wclovers WCFM Marketplace – Best Multivendor Marketplace for WooCommerce
The WCFM Marketplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcfm_stores' shortcode in versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2023-4960 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WCFM Marketplace plugin for WordPress, developed by wclovers. This plugin is widely used to enable multivendor marketplace functionality on WooCommerce-based e-commerce sites. The vulnerability exists in versions up to and including 3.6.2, specifically within the 'wcfm_stores' shortcode. The root cause is insufficient sanitization and output escaping of user-supplied attributes, allowing authenticated users with contributor-level or higher permissions to inject arbitrary JavaScript code into pages. Because this is a stored XSS, the malicious script is saved on the server and executed whenever any user accesses the compromised page. The CVSS 3.1 base score is 6.4 (medium severity), with the vector indicating network attack vector, low attack complexity, privileges required at the low level (contributor), no user interaction needed, and a scope change. The impact includes partial confidentiality and integrity loss, as attackers can execute scripts in the context of other users, potentially stealing session tokens, performing actions on behalf of users, or defacing content. No known exploits are reported in the wild yet. The vulnerability affects all versions of the plugin up to 3.6.2, and no official patch links are provided in the data, indicating that users should monitor vendor advisories for updates or apply manual mitigations.
Potential Impact
For European organizations operating WooCommerce sites with the WCFM Marketplace plugin, this vulnerability poses a significant risk to the integrity and confidentiality of their e-commerce platforms. Attackers with contributor-level access—often users who can add or edit content but are not full administrators—can inject malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, unauthorized actions such as changing product listings or prices, theft of customer data, or distribution of malware to end users. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs) in retail and services, exploitation could damage brand reputation, cause financial loss, and violate GDPR requirements for data protection. The lack of user interaction for exploitation increases the risk, as scripts execute automatically when pages are viewed. However, the requirement for contributor-level privileges somewhat limits the attack surface to insiders or compromised accounts.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WCFM Marketplace plugin. Until an official patch is released, administrators should restrict contributor-level permissions to trusted users only and consider temporarily disabling the 'wcfm_stores' shortcode if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide additional protection. Regularly monitoring logs for unusual contributor activity and scanning site content for injected scripts is advised. Organizations should also educate content contributors about secure input practices and enforce strong authentication mechanisms to reduce the risk of account compromise. Once a vendor patch is available, prompt application is critical. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-4960: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wclovers WCFM Marketplace – Best Multivendor Marketplace for WooCommerce
Description
The WCFM Marketplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcfm_stores' shortcode in versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2023-4960 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WCFM Marketplace plugin for WordPress, developed by wclovers. This plugin is widely used to enable multivendor marketplace functionality on WooCommerce-based e-commerce sites. The vulnerability exists in versions up to and including 3.6.2, specifically within the 'wcfm_stores' shortcode. The root cause is insufficient sanitization and output escaping of user-supplied attributes, allowing authenticated users with contributor-level or higher permissions to inject arbitrary JavaScript code into pages. Because this is a stored XSS, the malicious script is saved on the server and executed whenever any user accesses the compromised page. The CVSS 3.1 base score is 6.4 (medium severity), with the vector indicating network attack vector, low attack complexity, privileges required at the low level (contributor), no user interaction needed, and a scope change. The impact includes partial confidentiality and integrity loss, as attackers can execute scripts in the context of other users, potentially stealing session tokens, performing actions on behalf of users, or defacing content. No known exploits are reported in the wild yet. The vulnerability affects all versions of the plugin up to 3.6.2, and no official patch links are provided in the data, indicating that users should monitor vendor advisories for updates or apply manual mitigations.
Potential Impact
For European organizations operating WooCommerce sites with the WCFM Marketplace plugin, this vulnerability poses a significant risk to the integrity and confidentiality of their e-commerce platforms. Attackers with contributor-level access—often users who can add or edit content but are not full administrators—can inject malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, unauthorized actions such as changing product listings or prices, theft of customer data, or distribution of malware to end users. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs) in retail and services, exploitation could damage brand reputation, cause financial loss, and violate GDPR requirements for data protection. The lack of user interaction for exploitation increases the risk, as scripts execute automatically when pages are viewed. However, the requirement for contributor-level privileges somewhat limits the attack surface to insiders or compromised accounts.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the WCFM Marketplace plugin. Until an official patch is released, administrators should restrict contributor-level permissions to trusted users only and consider temporarily disabling the 'wcfm_stores' shortcode if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections in shortcode parameters can provide additional protection. Regularly monitoring logs for unusual contributor activity and scanning site content for injected scripts is advised. Organizations should also educate content contributors about secure input practices and enforce strong authentication mechanisms to reduce the risk of account compromise. Once a vendor patch is available, prompt application is critical. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-09-14T14:25:20.291Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e660d
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:42:43 PM
Last updated: 7/29/2025, 12:39:02 AM
Views: 9
Related Threats
CVE-2025-8975: Cross Site Scripting in givanz Vvveb
MediumCVE-2025-55716: CWE-862 Missing Authorization in VeronaLabs WP Statistics
MediumCVE-2025-55714: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor
MediumCVE-2025-55713: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in CreativeThemes Blocksy
MediumCVE-2025-55712: CWE-862 Missing Authorization in POSIMYTH The Plus Addons for Elementor Page Builder Lite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.