Impact
The Customer Reviews for WooCommerce plugin allows the author field of user reviews to be stored without proper sanitization or escaping. When an attacker supplies malicious code in this field, that script becomes embedded in the review list page and is executed whenever a user views the page. This stored XSS flaw permits the execution of arbitrary scripts in the context of site visitors.
Affected Systems
Vulnerable versions of the Customer Reviews for WooCommerce plugin from ivole up to and including version 5.80.2 are affected. Sites that continue to run any of these releases expose all visitors to the risk of injected script execution.
Risk and Exploitability
The CVSS score of 6.4 signals moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation at the present time. The flaw is not listed in the CISA KEV catalog. Because it can be triggered without authentication, any user who can submit a review can inject code that persists and runs for all subsequent visitors to the review page.
OpenCVE Enrichment
EUVD