CVE-2024-11369
📋 TL;DR
This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) attacks via the 'coupon', 'start_date', and 'end_date' parameters in the Store credit / Gift cards for WooCommerce WordPress plugin. Attackers can inject malicious scripts that execute when users click specially crafted links, potentially stealing session cookies or performing actions on behalf of the user. All WordPress sites using this plugin up to version 1.0.49.46 are affected.
💻 Affected Systems
- Store credit / Gift cards for WooCommerce WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full administrative access to the WordPress site, install backdoors, deface the site, or steal customer data including payment information.
Likely Case
Attackers steal user session cookies to hijack accounts, redirect users to malicious sites, or perform limited actions on behalf of authenticated users.
If Mitigated
Script execution is blocked by Content Security Policy (CSP) headers or browser XSS filters, limiting impact to parameter reflection without code execution.
🎯 Exploit Status
The vulnerability requires user interaction (clicking a malicious link) but is trivial to exploit once a user is tricked. No authentication is required to trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.49.47 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3213698/store-credit-for-woocommerce/trunk/admin/report.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Store credit / Gift cards for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.0.49.47+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Store credit / Gift cards for WooCommerce plugin until patched
wp plugin deactivate store-credit-for-woocommerce
Implement WAF rules
allAdd web application firewall rules to block requests containing script tags in coupon, start_date, and end_date parameters
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
- Use browser security features like X-XSS-Protection and X-Content-Type-Options headers
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Store credit / Gift cards for WooCommerce' version. If version is 1.0.49.46 or lower, you are vulnerable.
Check Version:
wp plugin get store-credit-for-woocommerce --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 1.0.49.47 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing script tags or JavaScript code in coupon, start_date, or end_date parameters
- Multiple failed XSS attempts in web server logs
Network Indicators:
- Unusual parameter values containing <script> tags or JavaScript in GET requests
- Requests to admin/report.php with suspicious parameter values
SIEM Query:
source="web_server_logs" AND (uri_path="*admin/report.php*" AND (param="*<script>*" OR param="*javascript:*"))
🔗 References
- https://plugins.trac.wordpress.org/browser/store-credit-for-woocommerce/tags/1.0.49.42/admin/report.php#L113
- https://plugins.trac.wordpress.org/browser/store-credit-for-woocommerce/tags/1.0.49.42/admin/report.php#L119
- https://plugins.trac.wordpress.org/browser/store-credit-for-woocommerce/tags/1.0.49.42/admin/report.php#L95
- https://plugins.trac.wordpress.org/changeset/3213698/store-credit-for-woocommerce/trunk/admin/report.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2e8527c0-a4b0-436d-901a-c07f93c7ec5e?source=cve