• Resolved wineschoolofcheshire

    (@wineschoolofcheshire)


    Good morning

    Wordfense has reported a vulnerability from your latest update – info copy and pasted from their report below:

    The Email Template Customizer for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with shop manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Viewing 7 replies - 1 through 7 (of 7 total)
  • Plugin Support angelagrey

    (@angelagrey)

    Hi,

    Thank you for reaching out to us.

    We didn’t receive any report regarding this issue since then so I don’t know about this (I checked all the mail folders thoroughly). Our team will review and update our plugin at the earliest if there’s any.

    Just to clarify, our plugin works on the back end only, which means the users who access your site must at least have manage_woocommerce permission to reach the email setting page.

    Best regards

    Wordfense has reported a vulnerability from your latest update v1.2.7 – info copy and pasted from their report below:

    Please take quick action on this.

    Plugin Support angelagrey

    (@angelagrey)

    We just contacted patchstack team and is working on it. We’ll update soon.

    Thread Starter wineschoolofcheshire

    (@wineschoolofcheshire)

    Thank you for the update ??

    Thread Starter wineschoolofcheshire

    (@wineschoolofcheshire)

    Hi, since the latest WordPress update this vulnerability warning has appeared again. Text as follows:

    The Email Template Customizer for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with shop manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

    Plugin Support angelagrey

    (@angelagrey)

    This should be addressed in the latest version, you can find the confirmation from patchstack team here:?https://share.nmblc.cloud/4b9f3fdb

    This error was originally reported by Patchstack, and we’ve already fixed it on our end. However, updating the vulnerability report isn’t within our control if Wordfence hasn’t yet updated their records.

    Thread Starter wineschoolofcheshire

    (@wineschoolofcheshire)

    Thank you, I’ll raise a ticket to Wordfense

Viewing 7 replies - 1 through 7 (of 7 total)
  • You must be logged in to reply to this topic.