Impact
The Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto plugin for WordPress contains an insufficient input sanitization flaw in the sync() function that permits malicious JavaScript to be stored and subsequently executed on any affected page. This stored cross‑site scripting runs whenever a visitor accesses the page, enabling attackers to execute code in the victim’s browser context.
Affected Systems
WordPress sites running the Codisto Omnichannel plugin version 1.3.65 or earlier are vulnerable. All releases up to and including 1.3.65 contain the flaw; newer releases are free of this issue.
Risk and Exploitability
The CVSS score of 7.2 signals a high potential impact, while an EPSS score of <1% suggests a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attacks can be carried out without authentication by sending a crafted sync request containing malicious payload; once stored, the script is served to all visitors when they view the affected content.
OpenCVE Enrichment