Description
The Premmerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'premmerce_wizard_actions' AJAX endpoint in all versions up to, and including, 1.3.20. This is due to missing capability checks and insufficient input sanitization and output escaping on the `state` parameter. This makes it possible for authenticated attackers, with subscriber level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page (the Premmerce Wizard admin page).
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-12-24: | Discovered |
| 2026-02-06: | Disclosed |
Credits
Athiwat Tiprasaharn
References
www.wordfence.com/...-19a0-43a1-8ff6-7486d7ef29b3?source=cve
plugins.trac.wordpress.org/...0/src/Admin/Admin.php?marks=41
plugins.trac.wordpress.org/...zardHandler.php?marks=42,50,52
plugins.trac.wordpress.org/...src/Api/WizardApi.php?marks=38
plugins.trac.wordpress.org/...admin/tabs/wizard.php?marks=30