Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codexpert CoDesigner – The Most Compact and User-Friendly Elementor WooCommerce Builder

0
Medium
VulnerabilityCVE-2024-4564cvecve-2024-4564cwe-79
Published: Wed Jun 12 2024 (06/12/2024, 03:33:14 UTC)
Source: CVE Database V5
Vendor/Project: codexpert
Product: CoDesigner – The Most Compact and User-Friendly Elementor WooCommerce Builder

Description

CVE-2024-4564 is a stored cross-site scripting (XSS) vulnerability in the CoDesigner WooCommerce Builder plugin for WordPress, affecting all versions up to 4. 4. 1. The flaw exists in the Shop Slider, Tabs Classic, and Image Comparison widgets due to insufficient input sanitization and output escaping of user-supplied attributes. Authenticated attackers with contributor-level access or higher can inject malicious scripts that execute when any user views the compromised page. This vulnerability can lead to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users. Exploitation does not require user interaction beyond visiting the affected page, and no administrative privileges are needed, increasing the risk. The CVSS score is 6. 4 (medium severity), reflecting network attack vector, low attack complexity, and partial impact on confidentiality and integrity. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:49:37 UTC

Technical Analysis

CVE-2024-4564 is a stored cross-site scripting vulnerability classified under CWE-79 found in the CoDesigner WooCommerce Builder plugin for WordPress, specifically in versions up to and including 4.4.1. The vulnerability arises from improper neutralization of user input during web page generation, particularly in the Shop Slider, Tabs Classic, and Image Comparison widgets. These widgets fail to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The attack vector is remote over the network, with low complexity since only contributor-level privileges are required, and no user interaction is necessary beyond viewing the infected page. The vulnerability affects the confidentiality and integrity of user data but does not impact availability. The scope is broad as all versions up to 4.4.1 are affected, and the plugin is widely used in WooCommerce-based WordPress e-commerce sites. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if left unmitigated. The CVSS 3.1 score of 6.4 reflects these factors, indicating a medium severity threat. The vulnerability was publicly disclosed in June 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps by site administrators.

Potential Impact

The primary impact of CVE-2024-4564 is the compromise of user confidentiality and integrity on affected WordPress e-commerce sites using the CoDesigner plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, which can lead to theft of authentication cookies, personal data, or manipulation of site content and user actions. This can result in account takeover, fraudulent transactions, or defacement of the website. Since the vulnerability requires only contributor-level access, attackers can leverage compromised or malicious contributor accounts to escalate their impact. The lack of availability impact means the site remains operational, potentially allowing prolonged exploitation. For organizations, this can lead to reputational damage, loss of customer trust, regulatory penalties for data breaches, and financial losses due to fraud or remediation costs. The widespread use of WooCommerce and WordPress globally means many e-commerce businesses are at risk, especially those that allow contributor-level user roles without strict controls. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as exploit code could be developed rapidly given the public disclosure.

Mitigation Recommendations

1. Immediately restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 2. Apply strict input validation and output escaping on all user-supplied data within the affected widgets, either by updating to a patched version once available or by implementing custom code fixes. 3. Use Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the affected plugin components. 4. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous contributor actions. 5. Educate site administrators and contributors about the risks of XSS and safe content input practices. 6. Temporarily disable or remove the Shop Slider, Tabs Classic, and Image Comparison widgets if immediate patching is not possible. 7. Keep WordPress core, plugins, and themes updated regularly to minimize exposure to known vulnerabilities. 8. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the site. 9. Conduct regular security audits and penetration testing focusing on user input handling and privilege management. 10. Backup site data frequently to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-06T19:03:09.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b90b7ef31ef0b556b45

Added to database: 2/25/2026, 9:37:20 PM

Last enriched: 2/26/2026, 12:49:37 AM

Last updated: 2/26/2026, 11:30:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats