Description
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to a Stored DOM-Based Cross-Site Scripting via the plugin's Flash Sale Countdown module in all versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-03-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored DOM‑Based Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The vulnerability exists in the Flash Sale Countdown module of the ShopLentor plugin, allowing an attacker with contributor or higher privileges to inject scripts via a stored DOM‑based XSS flaw. The injected code executes in any user’s browser when visiting the affected page, potentially leading to credential theft, session hijacking, data exfiltration, or defacement. This weakness stems from insufficient input sanitization and output escaping, as identified by CWE‑79.

Affected Systems

The affected product is the ShopLentor – All‑in‑One WooCommerce Growth & Store Enhancement Plugin, developed by devitemsllc, which runs on WordPress. All releases up to and including version 3.1.0 are vulnerable.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Inferred from the description, an attacker must be authenticated as a contributor or higher, access the module editor, and supply malicious input; the malicious script is then stored and subsequently rendered in the page context for any user who views the page.

Generated by OpenCVE AI on April 21, 2026 at 21:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ShopLentor plugin to the latest version where the Flash Sale Countdown module has been fixed or remove the plugin entirely if an upgrade is not possible.
  • If upgrading is not feasible, disable or delete the Flash Sale Countdown module to eliminate the attack surface.
  • Restrict the Contributor role to trusted users only, or further limit access to module editing using a role–permission plugin, to reduce the likelihood of malicious input.

Generated by OpenCVE AI on April 21, 2026 at 21:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7405 The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to a Stored DOM-Based Cross-Site Scripting via the plugin's Flash Sale Countdown module in all versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00049}


Mon, 24 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Hasthemes
Hasthemes shoplentor
CPEs cpe:2.3:a:hasthemes:shoplentor:*:*:*:*:*:wordpress:*:*
Vendors & Products Hasthemes
Hasthemes shoplentor

Wed, 12 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to a Stored DOM-Based Cross-Site Scripting via the plugin's Flash Sale Countdown module in all versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) <= 3.1.0 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via Flash Sale Countdown Module
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hasthemes Shoplentor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:32.681Z

Reserved: 2025-02-20T21:42:27.209Z

Link: CVE-2025-1527

cve-icon Vulnrichment

Updated: 2025-03-12T14:10:12.779Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-12T12:15:14.473

Modified: 2025-03-24T17:50:57.550

Link: CVE-2025-1527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses