Impact
The WPC Smart Quick View for WooCommerce plugin contains insufficient input sanitization and output escaping on attributes supplied to the woosq_btn shortcode (CWE‑79). This flaw allows authenticated attackers with contributor or higher privileges to inject arbitrary JavaScript into WordPress pages. When a victim visits a page containing the malicious shortcode, the injected script is executed within the victim’s browser context.
Affected Systems
This vulnerability affects the wpclever WPC Smart Quick View for WooCommerce plugin in all releases up to and including version 4.2.1. Any WordPress installation that has the plugin installed at or below v4.2.1 is susceptible.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity, while the EPSS score of less than 1% suggests low exploitation likelihood. The vulnerability is not listed in CISA KEV, implying it is not a widely known or publicly exploited exploit. Attackers must first authenticate as a contributor or higher role in the WordPress site and then use the woosq_btn shortcode to embed malicious scripts. The impact is limited to pages rendered after the injection; broader network compromise is not inherent to the flaw.
OpenCVE Enrichment
EUVD