Skip to main content

CVE-2023-6626: CWE-79 Cross-Site Scripting (XSS) in Unknown Product Enquiry for WooCommerce

Medium
VulnerabilityCVE-2023-6626cvecve-2023-6626cwe-79
Published: Mon Jan 22 2024 (01/22/2024, 19:14:28 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: Product Enquiry for WooCommerce

Description

The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/08/2025, 16:40:04 UTC

Technical Analysis

CVE-2023-6626 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Product Enquiry for WooCommerce WordPress plugin versions prior to 3.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high privilege users, such as administrators, to inject and store malicious scripts. This stored XSS can be triggered even when the unfiltered_html capability is disabled, for example in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML content. The vulnerability requires high privilege (admin) access and user interaction to exploit, as the attacker must input malicious payloads into plugin settings that are later rendered in the WordPress admin or frontend context. The CVSS 3.1 base score is 4.8 (medium), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss through session hijacking, privilege escalation, or defacement, but no direct availability impact. No known exploits are currently reported in the wild. Since WooCommerce is a widely used e-commerce platform, and this plugin extends its functionality, the vulnerability could affect many online stores using WordPress, especially those with multisite configurations or restrictive HTML filtering policies. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.

Potential Impact

For European organizations, especially those operating e-commerce websites using WooCommerce with the Product Enquiry plugin, this vulnerability poses a risk of stored XSS attacks that can compromise administrative sessions or inject malicious scripts into the site. This could lead to unauthorized access to sensitive customer data, manipulation of product inquiries, or defacement of the online storefront, damaging brand reputation and customer trust. Multisite WordPress setups, common in large enterprises or agencies managing multiple sites, are particularly vulnerable since the usual HTML filtering protections can be bypassed. Given the GDPR requirements in Europe, any data breach or unauthorized data access resulting from exploitation could lead to regulatory penalties and legal consequences. Although exploitation requires admin privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. The medium severity score indicates moderate risk, but the potential impact on confidentiality and integrity in a commercial context is significant.

Mitigation Recommendations

1. Immediate mitigation should include restricting admin access strictly to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all changes to plugin settings and administrative inputs for suspicious or unexpected content that could indicate attempted exploitation. 3. Until an official patch is released, consider disabling or removing the Product Enquiry for WooCommerce plugin if it is not critical to business operations. 4. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin’s settings fields. 5. For multisite WordPress environments, review and tighten capability assignments and consider additional input sanitization at the network level. 6. Stay updated with vendor announcements and apply patches promptly once available. 7. Conduct regular security training for administrators to recognize and avoid introducing malicious content. 8. Utilize security plugins that can scan for stored XSS payloads in the database and sanitize output dynamically as an interim safeguard.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-12-08T15:09:10.566Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b43596

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:40:04 PM

Last updated: 8/15/2025, 7:20:15 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats