CVE-2023-41872

7.1 HIGH

📋 TL;DR

Unauthenticated reflected cross-site scripting (XSS) vulnerability in the Xtemos WoodMart WordPress theme allows attackers to inject malicious scripts via crafted URLs. When users click malicious links, attackers can steal session cookies, redirect users, or perform actions on their behalf. This affects WordPress sites using WoodMart theme version 7.2.4 or earlier.

💻 Affected Systems

Products:
  • Xtemos WoodMart WordPress Theme
Versions: <= 7.2.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable WoodMart theme versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full administrative access to WordPress site, install backdoors, deface website, or exfiltrate sensitive data.

🟠

Likely Case

Attackers steal user session cookies, hijack user accounts, redirect users to phishing sites, or perform limited actions within user permissions.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH - This is a reflected XSS vulnerability that can be exploited via crafted URLs, making internet-facing WordPress sites with WoodMart theme particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could still be targeted via phishing emails or internal links containing malicious payloads.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized in phishing campaigns and require minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-2-4-reflected-cross-site-scripting-xss-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for WoodMart theme updates. 4. Update to version 7.2.5 or later. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block XSS payloads in URL parameters

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent script execution from untrusted sources

Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"
Header set X-Frame-Options "SAMEORIGIN"

🧯 If You Can't Patch

  • Disable or replace WoodMart theme with alternative theme
  • Implement strict input validation and output encoding in custom code

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for WoodMart theme version. If version is 7.2.4 or earlier, system is vulnerable.

Check Version:

wp theme list --field=name,version --format=csv | grep woodmart

Verify Fix Applied:

Confirm WoodMart theme version is 7.2.5 or later in WordPress admin panel > Appearance > Themes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with script tags or JavaScript in URL parameters
  • Multiple failed XSS attempts in web server logs
  • Suspicious referrer URLs containing script payloads

Network Indicators:

  • HTTP requests with encoded script tags in query parameters
  • Traffic patterns showing users being redirected after clicking specific URLs

SIEM Query:

source="web_server_logs" AND (url="*<script>*" OR url="*javascript:*" OR url="*onerror=*" OR url="*onload=*")

🔗 References

📤 Share & Export