Impact
The vulnerability allows a malicious actor to store arbitrary JavaScript in the media[].href field of the Customer Reviews for WooCommerce plugin. When the injected data is displayed in a review page, the script executes in the browser of any visitor. This can lead to session hijacking, defacement, or theft of credentials, compromising the confidentiality and integrity of user data. The weakness is an insufficient input sanitization and output escaping flaw (CWE-79).
Affected Systems
The issue affects all installations of the Customer Reviews for WooCommerce plugin for WordPress with version 5.97.0 or earlier, managed by the vendor "ivole". No other WordPress plugins or core components are listed as vulnerable.
Risk and Exploitability
The CVSS score is 7.2, indicating a high severity. The EPSS score of less than 1% shows that the probability of a public exploit is low at the present time. The vulnerability is not listed in the CISA KEV catalog, but because it can be triggered by unauthenticated users when the "Enable for Guests" option is on, it is inferred that the attack vector is likely browser-based injection from any external website or user submission. The limited exploitation likelihood does not diminish the risk that an attacker could compromise site visitors if the vulnerability is present.
OpenCVE Enrichment