CVE-2023-6626: CWE-79 Cross-Site Scripting (XSS) in Unknown Product Enquiry for WooCommerce
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2023-6626 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Product Enquiry for WooCommerce WordPress plugin versions prior to 3.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the unfiltered_html capability is disabled, for example in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML content. The vulnerability requires high privilege (admin) access and user interaction to exploit, as the attacker must input malicious payloads into plugin settings that are later rendered in the WordPress admin or frontend context. The CVSS 3.1 base score is 4.8 (medium), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss through session hijacking, privilege escalation, or defacement, but no direct availability impact. No known exploits are currently reported in the wild. Since WooCommerce is a widely used e-commerce platform, and this plugin extends its functionality, the vulnerability could affect many online stores using WordPress, especially those with multisite configurations or restrictive HTML filtering policies. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.
Potential Impact
For European organizations, especially those operating e-commerce websites using WooCommerce with the Product Enquiry plugin, this vulnerability poses a risk of stored XSS attacks that can compromise administrative sessions or inject malicious scripts into the site. This could lead to unauthorized access to sensitive customer data, manipulation of product inquiries, or defacement of the online storefront, damaging brand reputation and customer trust. Multisite WordPress setups, common in large enterprises or agencies managing multiple sites, are particularly vulnerable since the usual HTML filtering protections can be bypassed. Given the GDPR requirements in Europe, any data breach or unauthorized data access resulting from exploitation could lead to regulatory penalties and legal consequences. Although exploitation requires admin privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The medium severity score indicates moderate risk, but the potential impact on confidentiality and integrity in a commercial context is significant.
Mitigation Recommendations
1. Immediate mitigation should include restricting admin access strictly to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all changes to plugin settings and administrative inputs for suspicious or unexpected content that could indicate attempted exploitation. 3. Until an official patch is released, consider disabling or removing the Product Enquiry for WooCommerce plugin if it is not critical to business operations. 4. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings fields. 5. For multisite WordPress environments, review and tighten capability assignments and consider additional input sanitization at the network level. 6. Stay updated with vendor announcements and apply patches promptly once available. 7. Conduct regular security training for administrators to recognize and avoid introducing malicious content. 8. Utilize security plugins that can scan for stored XSS payloads in the database and sanitize output dynamically as an interim safeguard.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6626: CWE-79 Cross-Site Scripting (XSS) in Unknown Product Enquiry for WooCommerce
Description
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2023-6626 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Product Enquiry for WooCommerce WordPress plugin versions prior to 3.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the unfiltered_html capability is disabled, for example in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML content. The vulnerability requires high privilege (admin) access and user interaction to exploit, as the attacker must input malicious payloads into plugin settings that are later rendered in the WordPress admin or frontend context. The CVSS 3.1 base score is 4.8 (medium), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss through session hijacking, privilege escalation, or defacement, but no direct availability impact. No known exploits are currently reported in the wild. Since WooCommerce is a widely used e-commerce platform, and this plugin extends its functionality, the vulnerability could affect many online stores using WordPress, especially those with multisite configurations or restrictive HTML filtering policies. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.
Potential Impact
For European organizations, especially those operating e-commerce websites using WooCommerce with the Product Enquiry plugin, this vulnerability poses a risk of stored XSS attacks that can compromise administrative sessions or inject malicious scripts into the site. This could lead to unauthorized access to sensitive customer data, manipulation of product inquiries, or defacement of the online storefront, damaging brand reputation and customer trust. Multisite WordPress setups, common in large enterprises or agencies managing multiple sites, are particularly vulnerable since the usual HTML filtering protections can be bypassed. Given the GDPR requirements in Europe, any data breach or unauthorized data access resulting from exploitation could lead to regulatory penalties and legal consequences. Although exploitation requires admin privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The medium severity score indicates moderate risk, but the potential impact on confidentiality and integrity in a commercial context is significant.
Mitigation Recommendations
1. Immediate mitigation should include restricting admin access strictly to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all changes to plugin settings and administrative inputs for suspicious or unexpected content that could indicate attempted exploitation. 3. Until an official patch is released, consider disabling or removing the Product Enquiry for WooCommerce plugin if it is not critical to business operations. 4. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings fields. 5. For multisite WordPress environments, review and tighten capability assignments and consider additional input sanitization at the network level. 6. Stay updated with vendor announcements and apply patches promptly once available. 7. Conduct regular security training for administrators to recognize and avoid introducing malicious content. 8. Utilize security plugins that can scan for stored XSS payloads in the database and sanitize output dynamically as an interim safeguard.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-12-08T15:09:10.566Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b43596
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:40:04 PM
Last updated: 8/15/2025, 7:20:15 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.