CVE-2024-4564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codexpert CoDesigner – The Most Compact and User-Friendly Elementor WooCommerce Builder
CVE-2024-4564 is a stored cross-site scripting (XSS) vulnerability in the CoDesigner WooCommerce Builder plugin for WordPress, affecting all versions up to 4. 4. 1. The flaw exists in the Shop Slider, Tabs Classic, and Image Comparison widgets due to insufficient input sanitization and output escaping of user-supplied attributes. Authenticated attackers with contributor-level access or higher can inject malicious scripts that execute when any user views the compromised page. This vulnerability can lead to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users. Exploitation does not require user interaction beyond visiting the affected page, and no administrative privileges are needed, increasing the risk. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial impact on confidentiality and integrity. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-4564 is a stored cross-site scripting vulnerability classified under CWE-79 found in the CoDesigner WooCommerce Builder plugin for WordPress, specifically in versions up to and including 4.4.1. The vulnerability arises from improper neutralization of user input during web page generation, particularly in the Shop Slider, Tabs Classic, and Image Comparison widgets. These widgets fail to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The attack vector is remote over the network, with low complexity since only contributor-level privileges are required, and no user interaction is necessary beyond viewing the infected page. The vulnerability affects the confidentiality and integrity of user data but does not impact availability. The scope is broad as all versions up to 4.4.1 are affected, and the plugin is widely used in WooCommerce-based WordPress e-commerce sites. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if left unmitigated. The CVSS 3.1 score of 6.4 reflects these factors, indicating a medium severity threat. The vulnerability was publicly disclosed in June 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps by site administrators.
Potential Impact
The primary impact of CVE-2024-4564 is the compromise of user confidentiality and integrity on affected WordPress e-commerce sites using the CoDesigner plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, which can lead to theft of authentication cookies, personal data, or manipulation of site content and user actions. This can result in account takeover, fraudulent transactions, or defacement of the website. Since the vulnerability requires only contributor-level access, attackers can leverage compromised or malicious contributor accounts to escalate their impact. The lack of availability impact means the site remains operational, potentially allowing prolonged exploitation. For organizations, this can lead to reputational damage, loss of customer trust, regulatory penalties for data breaches, and financial losses due to fraud or remediation costs. The widespread use of WooCommerce and WordPress globally means many e-commerce businesses are at risk, especially those that allow contributor-level user roles without strict controls. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as exploit code could be developed rapidly given the public disclosure.
Mitigation Recommendations
1. Immediately restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 2. Apply strict input validation and output escaping on all user-supplied data within the affected widgets, either by updating to a patched version once available or by implementing custom code fixes. 3. Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the affected plugin components. 4. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous contributor actions. 5. Educate site administrators and contributors about the risks of XSS and safe content input practices. 6. Temporarily disable or remove the Shop Slider, Tabs Classic, and Image Comparison widgets if immediate patching is not possible. 7. Keep WordPress core, plugins, and themes updated regularly to minimize exposure to known vulnerabilities. 8. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the site. 9. Conduct regular security audits and penetration testing focusing on user input handling and privilege management. 10. Backup site data frequently to enable recovery in case of compromise.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-4564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codexpert CoDesigner – The Most Compact and User-Friendly Elementor WooCommerce Builder
Description
CVE-2024-4564 is a stored cross-site scripting (XSS) vulnerability in the CoDesigner WooCommerce Builder plugin for WordPress, affecting all versions up to 4. 4. 1. The flaw exists in the Shop Slider, Tabs Classic, and Image Comparison widgets due to insufficient input sanitization and output escaping of user-supplied attributes. Authenticated attackers with contributor-level access or higher can inject malicious scripts that execute when any user views the compromised page. This vulnerability can lead to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users. Exploitation does not require user interaction beyond visiting the affected page, and no administrative privileges are needed, increasing the risk. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial impact on confidentiality and integrity. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-4564 is a stored cross-site scripting vulnerability classified under CWE-79 found in the CoDesigner WooCommerce Builder plugin for WordPress, specifically in versions up to and including 4.4.1. The vulnerability arises from improper neutralization of user input during web page generation, particularly in the Shop Slider, Tabs Classic, and Image Comparison widgets. These widgets fail to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The attack vector is remote over the network, with low complexity since only contributor-level privileges are required, and no user interaction is necessary beyond viewing the infected page. The vulnerability affects the confidentiality and integrity of user data but does not impact availability. The scope is broad as all versions up to 4.4.1 are affected, and the plugin is widely used in WooCommerce-based WordPress e-commerce sites. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if left unmitigated. The CVSS 3.1 score of 6.4 reflects these factors, indicating a medium severity threat. The vulnerability was publicly disclosed in June 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps by site administrators.
Potential Impact
The primary impact of CVE-2024-4564 is the compromise of user confidentiality and integrity on affected WordPress e-commerce sites using the CoDesigner plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, which can lead to theft of authentication cookies, personal data, or manipulation of site content and user actions. This can result in account takeover, fraudulent transactions, or defacement of the website. Since the vulnerability requires only contributor-level access, attackers can leverage compromised or malicious contributor accounts to escalate their impact. The lack of availability impact means the site remains operational, potentially allowing prolonged exploitation. For organizations, this can lead to reputational damage, loss of customer trust, regulatory penalties for data breaches, and financial losses due to fraud or remediation costs. The widespread use of WooCommerce and WordPress globally means many e-commerce businesses are at risk, especially those that allow contributor-level user roles without strict controls. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as exploit code could be developed rapidly given the public disclosure.
Mitigation Recommendations
1. Immediately restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 2. Apply strict input validation and output escaping on all user-supplied data within the affected widgets, either by updating to a patched version once available or by implementing custom code fixes. 3. Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the affected plugin components. 4. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous contributor actions. 5. Educate site administrators and contributors about the risks of XSS and safe content input practices. 6. Temporarily disable or remove the Shop Slider, Tabs Classic, and Image Comparison widgets if immediate patching is not possible. 7. Keep WordPress core, plugins, and themes updated regularly to minimize exposure to known vulnerabilities. 8. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the site. 9. Conduct regular security audits and penetration testing focusing on user input handling and privilege management. 10. Backup site data frequently to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-06T19:03:09.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b90b7ef31ef0b556b45
Added to database: 2/25/2026, 9:37:20 PM
Last enriched: 2/26/2026, 12:49:37 AM
Last updated: 2/26/2026, 11:30:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.