cve/2024/CVE-2024-7846.md
2025-09-29 21:09:30 +02:00

20 lines
895 B
Markdown

### [CVE-2024-7846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7846)
![](https://img.shields.io/static/v1?label=Product&message=YITH%20WooCommerce%20Ajax%20Search&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brightgreen)
### Description
YITH WooCommerce Ajax Search is vulnerable to a XSS vulnerability due to insufficient sanitization of user supplied block attributes. This makes it possible for Contributors+ attackers to inject arbitrary scripts.
### POC
#### Reference
- https://wpscan.com/vulnerability/86f7a136-d09b-4637-97ae-2cdaaff172a3/
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/fkie-cad/nvd-json-data-feeds