CVE-2024-13708

Published Apr 4, 2025

Last updated a year ago

Overview

Description
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in versions 4.0.1 to 7.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Source
security@wordfence.com
NVD status
Analyzed
Products
booster_for_woocommerce

Risk scores

CVSS 3.1

Type
Primary
Base score
7.2
Impact score
2.7
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Severity
HIGH

Weaknesses

security@wordfence.com
CWE-434

Social media

Hype score
Not currently trending

Configurations