Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5669: CWE-862 Missing Authorization in optemiz XPlainer – WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin]

0
Medium
VulnerabilityCVE-2024-5669cvecve-2024-5669cwe-862
Published: Tue Jul 09 2024 (07/09/2024, 08:33:11 UTC)
Source: CVE Database V5
Vendor/Project: optemiz
Product: XPlainer – WooCommerce Product FAQ [WooCommerce Accordion FAQ Plugin]

Description

CVE-2024-5669 is a medium severity vulnerability in the XPlainer – WooCommerce Product FAQ plugin for WordPress, affecting all versions up to 1. 6. 4. It arises from a missing authorization check in the 'ffw_activate_template' function, allowing authenticated users with Subscriber-level access or higher to inject stored cross-site scripting (XSS) payloads. These malicious scripts execute when administrators or users view dashboard templates or access FAQs, potentially leading to session hijacking or privilege escalation. Exploitation does not require user interaction beyond authentication, and the vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data modification and XSS attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:46:03 UTC

Technical Analysis

CVE-2024-5669 is a vulnerability classified under CWE-862 (Missing Authorization) found in the XPlainer – WooCommerce Product FAQ plugin, also known as WooCommerce Accordion FAQ Plugin, for WordPress. The flaw exists in all versions up to and including 1.6.4 due to the absence of a capability check in the 'ffw_activate_template' function. This function can be invoked by authenticated users with Subscriber-level privileges or higher, enabling them to store malicious cross-site scripting (XSS) payloads within the plugin's dashboard templates or FAQ content. When these templates or FAQs are viewed by administrators or other users with higher privileges, the stored XSS payload executes in their browsers. The vulnerability allows attackers to compromise confidentiality by stealing session cookies or sensitive data and integrity by modifying displayed content or performing unauthorized actions within the WordPress admin interface. The CVSS 3.1 base score is 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and scope change (S:C). Although no known exploits are reported in the wild, the vulnerability's presence in a popular WooCommerce plugin makes it a significant risk for e-commerce sites using WordPress. The lack of a patch link indicates that users must monitor vendor updates or apply manual mitigations. The vulnerability does not affect availability directly but can facilitate further attacks if exploited.

Potential Impact

The vulnerability enables attackers with minimal privileges (Subscriber-level) to inject persistent XSS payloads that execute in the context of higher-privileged users, such as administrators. This can lead to session hijacking, credential theft, unauthorized content modification, and potential privilege escalation within WordPress environments. For organizations running WooCommerce stores, this can result in compromised customer data, defacement of product FAQs, and loss of trust. Since WooCommerce is widely used in e-commerce, exploitation could disrupt business operations and damage brand reputation. The scope change in the CVSS vector indicates that the attack can affect components beyond the initially compromised user, amplifying the impact. Although availability is not directly impacted, the confidentiality and integrity breaches can have severe downstream effects, including compliance violations and financial losses.

Mitigation Recommendations

1. Immediately update the XPlainer – WooCommerce Product FAQ plugin to a patched version once available from the vendor. 2. Until a patch is released, restrict Subscriber-level users from accessing or interacting with the vulnerable 'ffw_activate_template' functionality by applying custom capability checks or role restrictions via WordPress hooks or security plugins. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the plugin's endpoints. 4. Conduct regular security audits of installed plugins, focusing on authorization checks and input sanitization. 5. Educate administrators to monitor dashboard templates and FAQs for unexpected or suspicious content. 6. Employ Content Security Policy (CSP) headers to mitigate the impact of stored XSS by restricting script execution sources. 7. Limit the number of users with Subscriber-level access and review user roles periodically to minimize attack surface. 8. Monitor WordPress logs for unusual activity related to the plugin's functions. These steps provide layered defense until an official patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-06T00:20:57.870Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6befb7ef31ef0b55cc70

Added to database: 2/25/2026, 9:38:55 PM

Last enriched: 2/26/2026, 2:46:03 AM

Last updated: 2/26/2026, 7:59:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats