
Cloud Vulnerability DB
A community-led vulnerabilities database
The Currency Switcher for WooCommerce WordPress plugin versions up to 2.16.2 were found to contain a Reflected Cross-Site Scripting vulnerability. The issue was discovered by security researcher Colin Xu and was publicly disclosed on February 28, 2025. The vulnerability received a CVE identifier CVE-2024-9217 and was subsequently added to the National Vulnerability Database (NVD) on March 1, 2025 (Wordfence Intel).
The vulnerability stems from improper implementation of the add_query_arg function in the plugin's code. The issue has been assigned a CVSS score of 6.1 (Medium), with the following vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This indicates that the vulnerability is network-accessible, requires low attack complexity, needs no privileges, but does require user interaction (Wordfence Intel).
The Reflected Cross-Site Scripting vulnerability could allow attackers to execute malicious scripts in users' browsers within the context of the affected website. This could potentially lead to theft of sensitive information or manipulation of the website's content for targeted users (Red Hat Portal).
Website administrators running the affected versions of Currency Switcher for WooCommerce should upgrade to a patched version of the plugin when available. In the meantime, implementing Web Application Firewall (WAF) rules to filter potentially malicious input could help mitigate the risk (Red Hat Portal).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."