Sploit.io - Search

Product: J&T Express Malaysia, version: >= n/a, <= 2.0.13

CVE-2024-54305

Severity: HIGH

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in woocs J&T Express Malaysia allows Reflected XSS.This issue affects J&T Express Malaysia: from n/a through 2.0.13.

CVSS Score: 7.1

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001370000
  • Percentile: 0.334980000
  • Date: 2026-04-16

ExploitDB

No data available.

HackerOne Data

  • Rank: 9110
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • woocs J&T Express Malaysia - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, a Reflected Cross-Site Scripting (XSS) flaw within the J&T Express Malaysia WordPress plugin (versions up to 2.0.13), presents a moderate risk. Reflected XSS occurs when malicious scripts are injected into a trusted web page through user input. This vulnerability allows an attacker to execute arbitrary JavaScript code in the context of a user’s browser when the user interacts with a specially crafted URL. The likelihood of exploitation is moderate, as it requires a user to click a malicious link, but the ease of exploitation is relatively high as XSS vulnerabilities are often straightforward to implement. The business impact could range from minor user annoyance (e.g., redirects) to more serious consequences such as session hijacking, defacement of the J&T Express Malaysia website as seen by the user, or theft of user credentials if the page handles sensitive data. Confidentiality could be compromised if cookies or other session tokens are stolen. Integrity could be compromised if the attacker modifies the page content. Availability is less directly impacted, but a particularly disruptive XSS payload could degrade performance or even cause a denial-of-service for the affected user. The EPSS score of 0.001370000 suggests a relatively low, but non-zero, probability of exploitation.

    2. Potential Attack Scenarios
    An attacker could craft a malicious URL containing a JavaScript payload and distribute it to J&T Express Malaysia customers via phishing emails, social media, or other channels. For example, the attacker could send an email pretending to be from J&T Express, with a link to track a package. This link, however, contains the XSS payload. When a user clicks the link, the malicious JavaScript executes in their browser. This script could steal the user’s J&T Express Malaysia session cookie, allowing the attacker to impersonate the user and access their account information, potentially including shipping addresses and tracking details. The attacker could also redirect the user to a phishing page designed to collect more sensitive information, such as credit card details if the J&T Express Malaysia plugin integrates with a payment gateway. Another scenario involves the attacker embedding the malicious link in a comment on a blog post that uses the J&T Express Malaysia plugin, waiting for a user to view the comment.

    3. Mitigation Recommendations
    The primary mitigation is to update the J&T Express Malaysia plugin to version 2.0.15 or later. This version includes the fix for the Reflected XSS vulnerability. WordPress administrators should promptly update the plugin through the WordPress admin dashboard. Secondary mitigations include input validation and output encoding. While the plugin update should address the core issue, ensuring all user-supplied input is properly sanitized before being displayed on the web page can provide an additional layer of protection. Output encoding ensures that characters with special meaning in HTML are properly escaped, preventing them from being interpreted as code. Refer to the Patchstack vulnerability database for more details: https://patchstack.com/database/Wordpress/Plugin/jt-express/vulnerability/wordpress-j-t-express-malaysia-plugin-2-0-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve. Regularly reviewing and updating all WordPress plugins is a best practice for overall security.

    4. Executive Summary
    The J&T Express Malaysia WordPress plugin is affected by a Reflected Cross-Site Scripting (XSS) vulnerability, potentially allowing attackers to execute malicious JavaScript code in the browsers of website visitors. This could lead to session hijacking, data theft, or website defacement. While the risk is moderate, it’s important to address it promptly, as a successful attack could impact customer trust and potentially compromise user data. The primary mitigation is to update the plugin to version 2.0.15 or later. This is a straightforward update that will significantly reduce the risk of exploitation. Updating the plugin is crucial for maintaining the security and integrity of the J&T Express Malaysia website and protecting customer information. Prompt action will minimize the potential for business disruption and maintain customer confidence.