Home

Description

WOOF Products Filter for WooCommerce 1.2.3 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by entering XSS payloads in design tab textfields. Attackers can inject JavaScript code through fields like 'Text for block toggle' and 'Custom front css styles' that executes on frontend pages when saved, affecting all site visitors.

PUBLISHED Reserved 2026-02-10 | Published 2026-05-13 | Updated 2026-05-15 | Assigner VulnCheck




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 5.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.2.3
affected

Credits

Shahab.ra.9 finder

References

www.exploit-db.com/exploits/48088 (ExploitDB-48088) exploit

products-filter.com/ (Official Product Homepage) product

wordpress.org/plugins/woocommerce-products-filter/ (Product Reference) product

www.vulncheck.com/...s-filter-for-woocommerce-persistent-xss (VulnCheck Advisory: WOOF Products Filter for WooCommerce 1.2.3 Persistent XSS) third-party-advisory

cve.org (CVE-2020-37174)

nvd.nist.gov (CVE-2020-37174)

Download JSON