CVE-2024-45366

6.1 MEDIUM

📋 TL;DR

Welcart e-Commerce versions before 2.11.2 contain a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts into web pages. When exploited, these scripts execute in users' browsers, potentially stealing session cookies, redirecting to malicious sites, or performing actions on behalf of authenticated users. This affects all Welcart e-Commerce websites running vulnerable versions.

💻 Affected Systems

Products:
  • Welcart e-Commerce
Versions: All versions prior to 2.11.2
Operating Systems: Any OS running WordPress with Welcart plugin
Default Config Vulnerable: ⚠️ Yes
Notes: This is a WordPress plugin vulnerability. The vulnerability exists in the Welcart plugin itself, not dependent on specific OS or server configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full control of the e-commerce site, access customer data including payment information, and deface or modify the website.

🟠

Likely Case

Attackers steal user session cookies to hijack accounts, redirect users to phishing sites, or inject malicious content that compromises visitors' browsers.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers, preventing execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity. The exact attack vector (reflected or stored) is not specified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.11.2

Vendor Advisory: https://www.welcart.com/archives/22581.html

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Welcart e-Commerce' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.11.2 from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution to trusted sources only

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

Enable WordPress Security Plugins

all

Use security plugins that provide XSS protection and input sanitization

Install and configure Wordfence, Sucuri, or iThemes Security plugins

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Disable user input fields that accept HTML/JavaScript until patch can be applied

🔍 How to Verify

Check if Vulnerable:

Check Welcart plugin version in WordPress admin panel under Plugins → Installed Plugins

Check Version:

WordPress CLI: wp plugin list --name=welcart --field=version

Verify Fix Applied:

Confirm Welcart plugin version is 2.11.2 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests with script tags or JavaScript code in parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script>, javascript:, or eval() in URL parameters or form data

SIEM Query:

source="web_server_logs" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export