CVE-2024-10837
Description
The SysBasics Customize My Account for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in all versions up to, and including, 2.7.29 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in SysBasics Customize My Account for WooCommerce plugin via the unescaped 'tab' parameter allows unauthenticated attackers to inject arbitrary web scripts.
Vulnerability
Description
The SysBasics Customize My Account for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in versions up to and including 2.7.29. The vulnerability exists due to insufficient input sanitization and output escaping of the tab parameter [1]. This allows an attacker to inject arbitrary web scripts into pages that will execute in the context of a victim's browser.
Exploitation
An unauthenticated attacker can exploit this vulnerability by crafting a malicious link containing the tab parameter with a JavaScript payload. The attacker must then trick a user—such as an administrator or shop manager—into clicking the link. No authentication or special network position is required for the initial injection, making the attack vector straightforward for social engineering campaigns.
Impact
Successful exploitation leads to arbitrary JavaScript execution in the victim's browser. An attacker can perform actions such as stealing session cookies, modifying page content, or redirecting the user to malicious sites. Since the script executes in the context of the vulnerable WordPress site, it can potentially access sensitive information and perform actions on behalf of the victim.
Mitigation
The vendor has not yet released a patched version as of the publication date. The plugin is available for download from the WordPress plugin repository [1]. Administrators should monitor for updates and consider temporarily disabling the plugin or applying a web application firewall rule to filter malicious tab parameter inputs until a fix is applied.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/customize-my-account-for-woocommerce/tags/2.7.19/phppoet-checkout-fields/include/admin/pcfme_admin_settings.phpnvd
- plugins.trac.wordpress.org/changeset/3183607/nvd
- wordpress.org/plugins/customize-my-account-for-woocommerce/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/0ced1c79-97fe-4841-9a02-ffb9f336212anvd
News mentions
0No linked articles in our index yet.