Impact
The vulnerable WPC Smart Compare for WooCommerce plugin allows authenticated users with Contributor role or higher to insert malicious script code into stored data that is subsequently rendered in a web page. This DOM‑based stored XSS flaw stems from missing input validation and output escaping, corresponding to CWE‑79. An attacker who injects a script can coerce any visitor of the affected page into executing the code, potentially leading to session hijacking, credential theft, or defacement, but only within the web interface of the affected WordPress site.
Affected Systems
WordPress sites running the WPC Smart Compare for WooCommerce plugin version 6.4.7 or earlier are affected. Any site that has installed this plugin and has users with Contributor-level permissions or higher can be used to embed the malicious payload.
Risk and Exploitability
The CVSS v3 score of 6.4 indicates a medium impact, while the EPSS score of less than 1% reflects a low probability of exploitation in the wild at the time of analysis. The flaw is not currently listed in the CISA KEV catalog. Attack requires legitimate credentials; thus an attacker must gain Contributor or higher access on the target site before injecting the script. Once injected, the payload runs automatically whenever a visitor loads the affected page, so the risk is confined to users of that site but can be high for anyone who accesses the compromised content.
OpenCVE Enrichment
EUVD