CVE-2024-38680
No known patch is available for this vulnerability.
The affected plugin has been removed from the WordPress.org directory (reason: Security Issue), and no patched version is being distributed through the official directory. If you have the affected software installed, you should uninstall or replace it rather than wait for an update.
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Appmaker Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps allows Reflected XSS.This issue affects Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps: from n/a through 1.36.12.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in Appmaker for WordPress up to version 1.36.12 allows attackers to inject malicious scripts via improperly neutralized input.
Vulnerability
Analysis
The Appmaker – Convert WooCommerce to Android & iOS Native Mobile Apps plugin for WordPress contains a reflected cross-site scripting (XSS) vulnerability in versions through 1.36.12. The issue stems from improper neutralization of user-supplied input during web page generation, leaving a vector for script injection [1]. This type of flaw is classified under CWE-79 and is considered moderately dangerous, with potential for inclusion in mass-exploit campaigns targeting thousands of websites regardless of size or popularity [1].
Exploitation
Method
Exploitation requires a privileged user to perform an action, such as clicking a malicious link, visiting a crafted page, or submitting a form. Although the attack can be initiated by a lower-privileged role, the final payload execution depends on a user interaction. No authentication is needed from the attacker beyond luring an appropriate target [1]. The attacker can inject arbitrary HTML and JavaScript into the response, which executes in the context of the victim's session.
Impact
Successful exploitation allows an attacker to inject malicious scripts—like redirects, advertisements, or other HTML payloads—into the website. These scripts execute when visitors access the affected page, potentially leading to session theft, defacement, or phishing attacks [1]. The attack surface is amplified by WordPress's wide adoption, making the plugin a common target.
Mitigation
Patchstack has released a virtual patch to block attacks until an official fix is available. Users are advised to update the plugin immediately once a patched version is released. If updating is not possible, consulting a hosting provider or web developer for assistance is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.36.12
Patches
0appmaker-woocommerce-mobile-app-managerThis plugin has been removed from the WordPress.org directory on 2024-07-10 (reason: Security Issue). No patched version is being distributed through the official directory. Users who have it installed should uninstall it.
Source: api.wordpress.org · directory page
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.