Impact
The plugin contains an unsanitized 'name' input that is stored and later output without proper escaping, allowing any attacker to embed malicious scripts. When an affected page is viewed, the injected code executes in the victim's browser, potentially stealing session cookies, defacing the site, or redirecting the user to malicious domains. This flaw is classified as a stored cross‑site scripting vulnerability (CWE‑79) and can be triggered without any authentication.
Affected Systems
Vulnerable versions of the plugin are all releases of Welcart e‑Commerce for WordPress up to and including 2.11.9. The risk applies to installations that have not upgraded beyond this build.
Risk and Exploitability
The CVSS base score of 7.2 indicates a high severity, but the EPSS score is below 1 %, suggesting that automated exploitation is presently low. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by submitting a crafted 'name' value through any input interface that writes the data to the database, such as product creation or order entry, and then influence a legitimate user to view the affected page.
OpenCVE Enrichment
EUVD