MEDIUM (5.5)
    Plugin

    Reflected Cross-Site Scripting in FloristPress for Woo Plugin

    Published Date: 3/26/2026
    CVE ID: CVE-2026-1986

    Summary

    The FloristPress for Woo plugin up to version 7.8.2 is vulnerable to reflected XSS via the 'noresults' parameter. This allows unauthenticated users to execute arbitrary web scripts by tricking users into clicking a malicious link.

    Vulnerability Details

    The vulnerability in the FloristPress for Woo plugin arises due to inadequate input sanitization and output escaping on the 'noresults' parameter. When this parameter is improperly handled, attackers can inject scripts that are executed in the context of the user who clicks on a crafted URL. This kind of attack is typical in reflected XSS scenarios, where the attack is initiated via a crafted link. Since the plugin affects eCommerce stores, an exploited vulnerability might lead to compromised customer data, including session cookies or personal information if subsequently exploited. The lack of proper security measures in handling user inputs makes this vulnerability significant despite the artifact showing an UNKNOWN severity rating. It is crucial for site administrators to address this to prevent potential exploitation and maintain the trustworthiness of their online stores.

    Recommendations

    To mitigate this vulnerability, apply proper input validation and output escaping practices throughout the plugin's code, especially concerning dynamic and user-contributed data. Web application firewalls can also help block exploit attempts.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More