CVE-2024-13696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdesk Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later
CVE-2024-13696 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later WordPress plugin, affecting all versions up to 1. 2. 25. The vulnerability arises from improper sanitization and escaping of the 'wishlist_name' parameter, allowing unauthenticated attackers to inject malicious scripts that execute when users view the affected pages. This can lead to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users. Exploitation requires no authentication or user interaction, increasing its risk. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat to e-commerce sites using this plugin. Organizations should prioritize patching or applying mitigations to prevent potential compromise. The vulnerability impacts confidentiality and integrity but not availability. Countries with large WooCommerce user bases and significant e-commerce activity, such as the United States, Germany, United Kingdom, Canada, Australia, and others, are most at risk.
AI Analysis
Technical Summary
CVE-2024-13696 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress, affecting all versions up to and including 1.2.25. The root cause is insufficient input sanitization and output escaping of the 'wishlist_name' parameter. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into wishlist pages. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 7.2 (high severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, no user interaction needed, and a scope change indicating impact beyond the vulnerable component. While no public exploits are currently known, the vulnerability's characteristics make it a critical concern for WooCommerce sites using this plugin. The plugin is popular among e-commerce sites built on WordPress, which is widely used globally. The vulnerability compromises confidentiality and integrity but does not affect availability. The lack of patches at the time of publication necessitates immediate mitigation steps.
Potential Impact
The vulnerability enables attackers to execute arbitrary scripts in the context of affected users, potentially leading to theft of sensitive information such as authentication cookies, personal data, or payment information. It can also facilitate unauthorized actions on behalf of users, including changing wishlist contents or other user-specific data. For e-commerce platforms, this can result in loss of customer trust, reputational damage, and potential financial losses. Since the attack requires no authentication or user interaction, the risk of widespread exploitation is significant once an exploit becomes available. The scope change in the CVSS vector indicates that the impact extends beyond the vulnerable plugin, potentially affecting the entire WordPress site and its users. Organizations relying on this plugin for wishlist functionality face increased risk of data breaches and account compromise, which can have regulatory and compliance implications, especially in regions with strict data protection laws.
Mitigation Recommendations
1. Immediate mitigation involves updating the Flexible Wishlist for WooCommerce plugin to a version that addresses this vulnerability once released by the vendor. 2. Until a patch is available, implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'wishlist_name' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 4. Sanitize and validate all user inputs at the application level, especially parameters that are reflected or stored and rendered in web pages. 5. Monitor web server and application logs for suspicious requests containing script payloads targeting the wishlist functionality. 6. Educate site administrators and users about the risks of XSS and encourage the use of strong, unique passwords and multi-factor authentication to mitigate session hijacking risks. 7. Consider temporarily disabling the wishlist functionality if immediate patching or WAF deployment is not feasible. 8. Conduct regular security assessments and penetration testing focusing on input validation and output encoding across all plugins and custom code.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdesk Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later
Description
CVE-2024-13696 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later WordPress plugin, affecting all versions up to 1. 2. 25. The vulnerability arises from improper sanitization and escaping of the 'wishlist_name' parameter, allowing unauthenticated attackers to inject malicious scripts that execute when users view the affected pages. This can lead to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users. Exploitation requires no authentication or user interaction, increasing its risk. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat to e-commerce sites using this plugin. Organizations should prioritize patching or applying mitigations to prevent potential compromise. The vulnerability impacts confidentiality and integrity but not availability. Countries with large WooCommerce user bases and significant e-commerce activity, such as the United States, Germany, United Kingdom, Canada, Australia, and others, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13696 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress, affecting all versions up to and including 1.2.25. The root cause is insufficient input sanitization and output escaping of the 'wishlist_name' parameter. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into wishlist pages. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 7.2 (high severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, no user interaction needed, and a scope change indicating impact beyond the vulnerable component. While no public exploits are currently known, the vulnerability's characteristics make it a critical concern for WooCommerce sites using this plugin. The plugin is popular among e-commerce sites built on WordPress, which is widely used globally. The vulnerability compromises confidentiality and integrity but does not affect availability. The lack of patches at the time of publication necessitates immediate mitigation steps.
Potential Impact
The vulnerability enables attackers to execute arbitrary scripts in the context of affected users, potentially leading to theft of sensitive information such as authentication cookies, personal data, or payment information. It can also facilitate unauthorized actions on behalf of users, including changing wishlist contents or other user-specific data. For e-commerce platforms, this can result in loss of customer trust, reputational damage, and potential financial losses. Since the attack requires no authentication or user interaction, the risk of widespread exploitation is significant once an exploit becomes available. The scope change in the CVSS vector indicates that the impact extends beyond the vulnerable plugin, potentially affecting the entire WordPress site and its users. Organizations relying on this plugin for wishlist functionality face increased risk of data breaches and account compromise, which can have regulatory and compliance implications, especially in regions with strict data protection laws.
Mitigation Recommendations
1. Immediate mitigation involves updating the Flexible Wishlist for WooCommerce plugin to a version that addresses this vulnerability once released by the vendor. 2. Until a patch is available, implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'wishlist_name' parameter. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 4. Sanitize and validate all user inputs at the application level, especially parameters that are reflected or stored and rendered in web pages. 5. Monitor web server and application logs for suspicious requests containing script payloads targeting the wishlist functionality. 6. Educate site administrators and users about the risks of XSS and encourage the use of strong, unique passwords and multi-factor authentication to mitigate session hijacking risks. 7. Consider temporarily disabling the wishlist functionality if immediate patching or WAF deployment is not feasible. 8. Conduct regular security assessments and penetration testing focusing on input validation and output encoding across all plugins and custom code.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T21:26:58.437Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e68b7ef31ef0b5a01a1
Added to database: 2/25/2026, 9:49:28 PM
Last enriched: 2/25/2026, 10:27:18 PM
Last updated: 2/26/2026, 11:14:35 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.