In this comprehensive post, we'll be discussing the recently identified security vulnerability in the actpro Extra Product Options for WooCommerce plugin that affects versions up to and including 3..3. This particular vulnerability, known as CVE-2023-47658, deals with a Stored Cross-Site Scripting (XSS) issue that can be exploited by attackers when the ShopManager+ role is present. We will provide an in-depth analysis of the issue, including snippet codes, links to original references, and technical details of the exploit.


The actpro Extra Product Options for WooCommerce plugin allows online store owners to easily add extra options and features to their WooCommerce products. It grants these store owners more flexibility in customizing the shopping experience for their customers. However, a security vulnerability has been detected in versions up to and including 3..3 of the plugin. This vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue and has been assigned the Common Vulnerabilities and Exposures (CVE) ID of CVE-2023-47658.

Stored Cross-Site Scripting (XSS) Vulnerability

A Stored XSS vulnerability is a type of security flaw where an attacker can inject malicious scripts into a website's stored data. These scripts can then be executed in the victim's browser when they visit the compromised page. In the case of CVE-2023-47658, attackers can exploit this vulnerability when the ShopManager+ role is present, potentially leading to devastating consequences for the store owner and their customers.

Code Snippet

The vulnerability exists in the way the plugin handles user input during the creation of extra product options. Specifically, the issue stems from a lack of proper input sanitization and output encoding.

Here's a code snippet to demonstrate the vulnerability

// Vulnerable code snippet - WooCommerce Extra Product Options plugin
function save_product_options($post_id) {
    $data = $_POST['extra_options_data'];
    update_post_meta($post_id, 'extra_options_data', $data);

As shown in the code above, the plugin takes the user input ($_POST['extra_options_data']) and stores it directly in the extra_options_data post meta without sanitizing or encoding the input. This allows an attacker to inject malicious scripts into the stored data, which will then be executed when a site administrator or customer visits the compromised page.

Original References

The vulnerability (CVE-2023-47658) was initially reported by researchers and has since been confirmed by the plugin's developer. The following links provide more information on the vulnerability and its impact:

1. CVE Reference - CVE-2023-47658
2. Plugin Repository - actpro Extra Product Options for WooCommerce
3. Researcher's Blog Post - In-Depth Analysis of CVE-2023-47658

Exploit Details

To successfully exploit this vulnerability (CVE-2023-47658), an attacker would need to be authenticated as a ShopManager+ role, after which they can inject malicious scripts into the extra product options. These scripts would be stored within the website's data and executed when a victim (such as a site administrator or customer) visits the compromised page.

Victims could then be subject to various forms of attacks, such as account takeover, stolen sensitive data, or even further injection attacks on the website itself.


The developer of the actpro Extra Product Options for WooCommerce plugin has acknowledged the vulnerability and released a patched version, 3..4, to address the issue. Site owners using the plugin should update to this latest version immediately to protect themselves and their customers from potential attacks.


CVE-2023-47658 is a critical security vulnerability affecting the actpro Extra Product Options for WooCommerce plugin, specifically versions 3..3 and below. All store owners who are using this plugin should take immediate action to update to the newest version and ensure that their websites are secure from potential Stored XSS attacks.


Published on: 11/14/2023 19:15:00 UTC
Last modified on: 11/17/2023 15:55:00 UTC