Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3991: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devitemsllc ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor)

0
Medium
VulnerabilityCVE-2024-3991cvecve-2024-3991cwe-79
Published: Thu May 02 2024 (05/02/2024, 16:52:08 UTC)
Source: CVE Database V5
Vendor/Project: devitemsllc
Product: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor)

Description

CVE-2024-3991 is a stored cross-site scripting (XSS) vulnerability in the ShopLentor WooCommerce Builder plugin for WordPress, affecting all versions up to 2. 8. 7. The flaw arises from improper sanitization and escaping of user-supplied input in the _id attribute of the Horizontal Product Filter. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts that execute when other users view the affected pages. This vulnerability can lead to the theft of sensitive information, session hijacking, or unauthorized actions performed in the context of the victim's browser. Exploitation does not require user interaction beyond page access but does require authenticated access with limited privileges. The CVSS v3. 1 score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:33:28 UTC

Technical Analysis

CVE-2024-3991 is a stored cross-site scripting vulnerability identified in the ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution WordPress plugin, formerly known as WooLentor. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of the _id attribute in the Horizontal Product Filter component. This flaw allows authenticated users with contributor-level or higher privileges to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 2.8.7. The attack vector is remote over the network, with low attack complexity, requiring only authenticated access but no user interaction for exploitation. The scope is considered changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges, impacting other users. The CVSS v3.1 score of 6.4 reflects a medium severity rating, with partial impacts on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used e-commerce plugin poses a significant risk to WordPress sites using ShopLentor, especially those with multiple user roles and contributors. The vulnerability underscores the importance of proper input validation and output encoding in web applications to prevent cross-site scripting attacks.

Potential Impact

The primary impact of CVE-2024-3991 is the potential compromise of user confidentiality and integrity within affected WordPress sites using the ShopLentor plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of other users’ browsers, which can lead to theft of session cookies, credentials, or other sensitive information. Attackers may also perform unauthorized actions on behalf of victims, such as changing account settings or making fraudulent transactions. Since the vulnerability requires contributor-level access, it could be exploited by malicious insiders or compromised accounts. The scope of impact extends beyond the attacker’s privileges, affecting all users who view the injected content. This can damage organizational reputation, lead to data breaches, and cause financial losses, especially for e-commerce sites relying on WooCommerce. Although no availability impact is noted, the integrity and confidentiality risks are significant. Organizations with multiple contributors or editors are at higher risk, as attackers can leverage lower-privileged accounts to escalate their impact. The lack of known exploits in the wild provides a window for remediation, but the widespread use of WordPress and WooCommerce increases the potential attack surface globally.

Mitigation Recommendations

To mitigate CVE-2024-3991, organizations should immediately update the ShopLentor plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider disabling or restricting access to the Horizontal Product Filter feature to prevent exploitation. Implement strict role-based access controls to limit contributor-level privileges only to trusted users and regularly audit user accounts for suspicious activity. Employ web application firewalls (WAFs) with rules designed to detect and block cross-site scripting payloads targeting the _id attribute or related plugin parameters. Additionally, site administrators should enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly scan the website for injected scripts or anomalous content and monitor logs for unusual behavior. Educate contributors about the risks of uploading or entering untrusted content. Finally, ensure that all input fields are properly sanitized and output is escaped in custom code or plugin extensions to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-19T14:11:23.131Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca3b7ef31ef0b56714f

Added to database: 2/25/2026, 9:41:55 PM

Last enriched: 2/26/2026, 6:33:28 AM

Last updated: 2/26/2026, 8:07:04 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats