High severity7.2NVD Advisory· Published Apr 1, 2025· Updated Apr 8, 2026
CVE-2024-12278
CVE-2024-12278
Description
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected products
1- cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*Range: <7.2.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.phpnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/234789db-1440-40ac-83e7-b8afb0ba4b5fnvdThird Party Advisory
- plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.phpnvdProduct
News mentions
0No linked articles in our index yet.