Atomic Edge analysis of CVE-2024-13362 (metadata-based):
This vulnerability is a Reflected DOM-based Cross-Site Scripting (XSS) affecting the Freemius framework (versions <= 2.10.1) as used by multiple WordPress plugins and themes, specifically impacting the "Remove Add to Cart WooCommerce" plugin (version 1.4.7). The flaw allows unauthenticated attackers to inject arbitrary web scripts via the 'url' parameter, which executes in the victim's browser upon clicking a crafted link. The CVSS v3.1 score is 6.1 (Medium), with network attack vector, low complexity, no privileges required, and user interaction needed (click).
Root Cause: Based on the CWE-79 classification and description, the root cause is improper neutralization of user-supplied input in the 'url' parameter during web page generation. Inferred from the framework context, the Freemius SDK likely reflects user-supplied URLs back into JavaScript execution contexts (e.g., via document.write, innerHTML, or window.location assignments) without proper sanitization or output escaping. Atomic Edge analysis concludes that the framework fails to sanitize or escape the 'url' parameter before using it in DOM manipulation routines, making it vulnerable to script injection. This conclusion is inferred from metadata and the common behavior of SDK-style components that handle redirects or link generation.
Exploitation: An unauthenticated attacker crafts a malicious URL containing JavaScript code in the 'url' parameter, such as `?url=javascript:alert(document.cookie)`. The attacker would trick a victim into clicking a crafted link pointing to a page using the Freemius SDK (e.g., "/?freemius_action=some_action&url=…") or a plugin endpoint that reflects the parameter. When the victim clicks the link, the browser executes the injected script in the context of the vulnerable WordPress site, allowing data theft (e.g., cookies, session tokens) or further malicious actions. The attack requires user interaction (click) but no authentication, making it a phishing vector.
Remediation: The fix requires strict input sanitization and output escaping for the 'url' parameter. Atomic Edge research recommends using WordPress's built-in functions: `esc_url_raw()` for storage/sanitization, and `esc_url()` or `esc_js()` before output in HTML or JavaScript contexts. The Freemius SDK should validate the URL against a whitelist of allowed schemes (http, https) and strip dangerous protocols like 'javascript:' or 'data:'. Additionally, applying CSP headers or using JavaScript encoding functions would prevent injection in dynamic DOM operations.
Impact: Successful exploitation enables stored cross-site scripting in reflective contexts, leading to cookie theft, session hijacking, redirection to malicious sites, or defacement. Since unauthenticated attackers can trigger the XSS, widespread campaigns targeting admin users could compromise site accounts. The impact is limited to the victim's browser session (not server-side), but combined with social engineering (e.g., phishing emails with crafted links), attackers can achieve significant harm, including account takeover if administrator cookies are stolen. The vulnerability affects multiple plugins/themes using Freemius, widening the attack surface.







