CVE-2024-29760
📋 TL;DR
This reflected cross-site scripting (XSS) vulnerability in Booster for WooCommerce allows attackers to inject malicious scripts into web pages viewed by other users. It affects WordPress sites using the Booster for WooCommerce plugin. Attackers can steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- Booster for WooCommerce (WordPress plugin)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of the WordPress site, install backdoors, steal customer data, or deface the website.
Likely Case
Attackers steal user session cookies, redirect users to phishing sites, or perform unauthorized actions in the context of logged-in users.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before reaching users, preventing exploitation.
🎯 Exploit Status
Reflected XSS typically requires user interaction but is easy to exploit via phishing. No public proof-of-concept found.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.1.8
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Booster for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.1.8+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable Booster for WooCommerce plugin until patched
wp plugin deactivate woocommerce-jetpack
Implement WAF rules
allAdd web application firewall rules to block XSS payloads
ModSecurity: SecRule ARGS "<script" "id:1001,phase:2,deny"
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use browser security features like HttpOnly cookies and SameSite attributes
🔍 How to Verify
Check if Vulnerable:
Check WordPress plugin version in admin panel or via wp-cli: wp plugin get woocommerce-jetpack --field=version
Check Version:
wp plugin get woocommerce-jetpack --field=version
Verify Fix Applied:
Confirm plugin version is 7.1.8 or higher and test input fields for proper sanitization
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests with script tags in parameters
- Multiple failed XSS attempts in web server logs
Network Indicators:
- HTTP requests containing <script>, javascript:, or encoded XSS payloads in query strings
SIEM Query:
source="web_server" AND ("<script" OR "javascript:" OR "%3Cscript") AND uri="*booster*"
🔗 References
- https://patchstack.com/database/vulnerability/woocommerce-jetpack/wordpress-booster-for-woocommerce-plugin-7-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/woocommerce-jetpack/wordpress-booster-for-woocommerce-plugin-7-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve