Sploit.io - Search

Product: Já-Já Pagamentos for WooCommerce, version: >= n/a, <= 1.3.0

CVE-2024-51624

Severity: HIGH

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos Já-Já Pagamentos for WooCommerce allows Reflected XSS. This issue affects Já-Já Pagamentos for WooCommerce: from n/a through 1.3.0.

CVSS Score: 7.1

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001380000
  • Percentile: 0.337570000
  • Date: 2026-04-21

ExploitDB

No data available.

HackerOne Data

  • Rank: 9134
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • jajapagamentos Já-Já Pagamentos for WooCommerce - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, identified as CVE-2024-51624, is a Reflected Cross-Site Scripting (XSS) vulnerability within the Já-Já Pagamentos for WooCommerce plugin, specifically versions up to and including 1.3.0. This means an attacker can inject malicious client-side scripts into web pages generated by the plugin. The business impact ranges from moderate to high, depending on the privileges of the user targeted and the data accessible via the affected WooCommerce instance. The likelihood of exploitation is moderate, as XSS vulnerabilities are well-understood and relatively easy to exploit, especially if the affected plugin handles user-supplied data without sufficient sanitization. The ease of exploitation is also moderate; an attacker typically needs to craft a malicious URL and trick a user into clicking it. This vulnerability primarily impacts the confidentiality and integrity of user data. An attacker could steal cookies, session tokens, or redirect users to malicious websites. Availability may be impacted if the injected script causes the browser to hang or consume excessive resources. The EPSS score of 0.001380000 suggests a relatively low, but not negligible, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    A potential attack scenario involves an attacker crafting a malicious URL containing the XSS payload and then sending it to a WooCommerce customer via email or a social media post. The customer, believing the link is legitimate, clicks on it, which directs them to the WooCommerce site and executes the injected script. The script could then steal the customer’s session cookie, allowing the attacker to impersonate the customer and potentially make purchases on their behalf. Alternatively, the script could redirect the customer to a phishing page designed to steal their credit card information. The attack vector is a crafted URL, the attack process is user interaction (clicking the link), and the potential outcome is session hijacking, data theft, or redirection to a malicious website. Another scenario is an attacker could embed the malicious script into a product search query. If a user then clicks on the search results, the XSS payload is triggered.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade the Já-Já Pagamentos for WooCommerce plugin to a version greater than 1.3.0. The latest version, incorporating the fix, should be available from the WordPress plugin repository or the vendor’s website. Immediate patching is recommended. In addition, consider implementing a Web Application Firewall (WAF) to filter out malicious XSS payloads before they reach the web server. Regularly review the plugin’s code for further potential vulnerabilities and ensure that user inputs are properly sanitized and validated. Consult the Patchstack vulnerability database for more details and updates: https://patchstack.com/database/Wordpress/Plugin/wc-ja-ja-pagamentos-multicaixa-express/vulnerability/wordpress-ja-ja-pagamentos-for-woocommerce-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve. Implement Content Security Policy (CSP) headers to restrict the sources from which scripts can be loaded, further limiting the impact of a successful XSS attack.

    4. Executive Summary
    The Já-Já Pagamentos for WooCommerce plugin contains a Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2024-51624) that could allow attackers to steal customer data or redirect them to malicious websites. This vulnerability affects all versions of the plugin up to and including 1.3.0. The risk is moderate, as exploitation is relatively easy, and the potential impact includes loss of customer trust and potential financial loss. To address this vulnerability, we recommend immediately upgrading the Já-Já Pagamentos for WooCommerce plugin to the latest version. This will ensure that customer data is protected and that the WooCommerce store remains secure. Prompt action is crucial to minimize the risk of a successful attack and maintain customer confidence in our online payment system. Failure to patch could lead to compromised customer accounts and potential financial losses.