CVE-2024-3991: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devitemsllc ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor)
CVE-2024-3991 is a stored cross-site scripting (XSS) vulnerability in the ShopLentor WooCommerce Builder plugin for WordPress, affecting all versions up to 2. 8. 7. The flaw arises from improper sanitization and escaping of user-supplied input in the _id attribute of the Horizontal Product Filter. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts that execute when other users view the affected pages. This vulnerability can lead to the theft of sensitive information, session hijacking, or unauthorized actions performed in the context of the victim's browser. Exploitation does not require user interaction beyond page access but does require authenticated access with limited privileges. The CVSS v3. 1 score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact.
AI Analysis
Technical Summary
CVE-2024-3991 is a stored cross-site scripting vulnerability identified in the ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution WordPress plugin, formerly known as WooLentor. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of the _id attribute in the Horizontal Product Filter component. This flaw allows authenticated users with contributor-level or higher privileges to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 2.8.7. The attack vector is remote over the network, with low attack complexity, requiring only authenticated access but no user interaction for exploitation. The scope is considered changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges, impacting other users. The CVSS v3.1 score of 6.4 reflects a medium severity rating, with partial impacts on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used e-commerce plugin poses a significant risk to WordPress sites using ShopLentor, especially those with multiple user roles and contributors. The vulnerability underscores the importance of proper input validation and output encoding in web applications to prevent cross-site scripting attacks.
Potential Impact
The primary impact of CVE-2024-3991 is the potential compromise of user confidentiality and integrity within affected WordPress sites using the ShopLentor plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of other users’ browsers, which can lead to theft of session cookies, credentials, or other sensitive information. Attackers may also perform unauthorized actions on behalf of victims, such as changing account settings or making fraudulent transactions. Since the vulnerability requires contributor-level access, it could be exploited by malicious insiders or compromised accounts. The scope of impact extends beyond the attacker’s privileges, affecting all users who view the injected content. This can damage organizational reputation, lead to data breaches, and cause financial losses, especially for e-commerce sites relying on WooCommerce. Although no availability impact is noted, the integrity and confidentiality risks are significant. Organizations with multiple contributors or editors are at higher risk, as attackers can leverage lower-privileged accounts to escalate their impact. The lack of known exploits in the wild provides a window for remediation, but the widespread use of WordPress and WooCommerce increases the potential attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-3991, organizations should immediately update the ShopLentor plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider disabling or restricting access to the Horizontal Product Filter feature to prevent exploitation. Implement strict role-based access controls to limit contributor-level privileges only to trusted users and regularly audit user accounts for suspicious activity. Employ web application firewalls (WAFs) with rules designed to detect and block cross-site scripting payloads targeting the _id attribute or related plugin parameters. Additionally, site administrators should enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly scan the website for injected scripts or anomalous content and monitor logs for unusual behavior. Educate contributors about the risks of uploading or entering untrusted content. Finally, ensure that all input fields are properly sanitized and output is escaped in custom code or plugin extensions to prevent similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, Brazil, France, Netherlands, Japan
CVE-2024-3991: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devitemsllc ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor)
Description
CVE-2024-3991 is a stored cross-site scripting (XSS) vulnerability in the ShopLentor WooCommerce Builder plugin for WordPress, affecting all versions up to 2. 8. 7. The flaw arises from improper sanitization and escaping of user-supplied input in the _id attribute of the Horizontal Product Filter. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts that execute when other users view the affected pages. This vulnerability can lead to the theft of sensitive information, session hijacking, or unauthorized actions performed in the context of the victim's browser. Exploitation does not require user interaction beyond page access but does require authenticated access with limited privileges. The CVSS v3. 1 score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial confidentiality and integrity impact.
AI-Powered Analysis
Technical Analysis
CVE-2024-3991 is a stored cross-site scripting vulnerability identified in the ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution WordPress plugin, formerly known as WooLentor. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of the _id attribute in the Horizontal Product Filter component. This flaw allows authenticated users with contributor-level or higher privileges to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 2.8.7. The attack vector is remote over the network, with low attack complexity, requiring only authenticated access but no user interaction for exploitation. The scope is considered changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges, impacting other users. The CVSS v3.1 score of 6.4 reflects a medium severity rating, with partial impacts on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the presence of this vulnerability in a widely used e-commerce plugin poses a significant risk to WordPress sites using ShopLentor, especially those with multiple user roles and contributors. The vulnerability underscores the importance of proper input validation and output encoding in web applications to prevent cross-site scripting attacks.
Potential Impact
The primary impact of CVE-2024-3991 is the potential compromise of user confidentiality and integrity within affected WordPress sites using the ShopLentor plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of other users’ browsers, which can lead to theft of session cookies, credentials, or other sensitive information. Attackers may also perform unauthorized actions on behalf of victims, such as changing account settings or making fraudulent transactions. Since the vulnerability requires contributor-level access, it could be exploited by malicious insiders or compromised accounts. The scope of impact extends beyond the attacker’s privileges, affecting all users who view the injected content. This can damage organizational reputation, lead to data breaches, and cause financial losses, especially for e-commerce sites relying on WooCommerce. Although no availability impact is noted, the integrity and confidentiality risks are significant. Organizations with multiple contributors or editors are at higher risk, as attackers can leverage lower-privileged accounts to escalate their impact. The lack of known exploits in the wild provides a window for remediation, but the widespread use of WordPress and WooCommerce increases the potential attack surface globally.
Mitigation Recommendations
To mitigate CVE-2024-3991, organizations should immediately update the ShopLentor plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should consider disabling or restricting access to the Horizontal Product Filter feature to prevent exploitation. Implement strict role-based access controls to limit contributor-level privileges only to trusted users and regularly audit user accounts for suspicious activity. Employ web application firewalls (WAFs) with rules designed to detect and block cross-site scripting payloads targeting the _id attribute or related plugin parameters. Additionally, site administrators should enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly scan the website for injected scripts or anomalous content and monitor logs for unusual behavior. Educate contributors about the risks of uploading or entering untrusted content. Finally, ensure that all input fields are properly sanitized and output is escaped in custom code or plugin extensions to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-04-19T14:11:23.131Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ca3b7ef31ef0b56714f
Added to database: 2/25/2026, 9:41:55 PM
Last enriched: 2/26/2026, 6:33:28 AM
Last updated: 2/26/2026, 8:07:04 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.