CVE-2024-50448

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users through improper input sanitization in the YITH WooCommerce Product Add-Ons WordPress plugin. It affects all WordPress sites using this plugin up to version 4.14.1. Attackers can execute arbitrary JavaScript in victims' browsers when they visit specially crafted URLs.

💻 Affected Systems

Products:
  • YITH WooCommerce Product Add-Ons WordPress Plugin
Versions: All versions up to and including 4.14.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. Vulnerability is present in default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on visitors' systems.

🟠

Likely Case

Session hijacking, credential theft, defacement of affected pages, or redirection to phishing sites.

🟢

If Mitigated

Limited impact with proper Content Security Policy (CSP) headers and input validation at the web application firewall level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link) but is straightforward to exploit once the vulnerable parameter is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.14.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-14-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find YITH WooCommerce Product Add-Ons. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.14.2+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Configure WAF to block XSS payloads targeting the vulnerable plugin parameters.

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent execution of inline scripts and unauthorized script sources.

Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"
Header set X-Frame-Options "SAMEORIGIN"

🧯 If You Can't Patch

  • Disable the YITH WooCommerce Product Add-Ons plugin if not essential for site functionality.
  • Implement network-level filtering to block malicious requests containing XSS payloads targeting the plugin.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > YITH WooCommerce Product Add-Ons. If version is 4.14.1 or lower, you are vulnerable.

Check Version:

wp plugin get yith-woocommerce-product-add-ons --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 4.14.2 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags or JavaScript payloads in query parameters related to the plugin
  • Unusual parameter values in URLs containing angle brackets, JavaScript functions, or encoded payloads

Network Indicators:

  • HTTP requests with suspicious parameters like <script>, javascript:, or encoded equivalents in query strings

SIEM Query:

source="web_server_logs" AND (uri="*yith-woocommerce-product-add-ons*" AND (query="*<script>*" OR query="*javascript:*" OR query="*%3Cscript%3E*"))

🔗 References

📤 Share & Export