The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-37174

CVE-2020-37174: WOOF WooCommerce Filter XSS Vulnerability

CVE-2020-37174 is a persistent cross-site scripting flaw in WOOF Products Filter for WooCommerce 1.2.3. Authenticated attackers can inject malicious scripts via design tab fields. This article covers technical details, impact, and mitigation.

Published: May 17, 2026

CVE-2020-37174 Overview

CVE-2020-37174 is a persistent cross-site scripting (XSS) vulnerability in the WOOF Products Filter for WooCommerce plugin version 1.2.3 [CWE-79]. Authenticated attackers with administrative access can inject JavaScript payloads through design tab textfields, including Text for block toggle and Custom front css styles. The injected scripts persist in the WordPress database and execute in the browsers of all site visitors when the affected frontend pages render. The flaw stems from missing input sanitization and output encoding in the plugin's settings handlers.

Critical Impact

Stored XSS payloads execute against every frontend visitor, enabling session theft, credential harvesting, and drive-by malware delivery against WooCommerce shoppers.

Affected Products

  • WOOF Products Filter for WooCommerce plugin version 1.2.3
  • WordPress sites using the affected plugin version with WooCommerce
  • Frontend visitors of any storefront running the vulnerable plugin build

Discovery Timeline

  • 2026-05-13 - CVE-2020-37174 published to the National Vulnerability Database (NVD)
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2020-37174

Vulnerability Analysis

The plugin exposes administrative configuration fields under its design tab without enforcing server-side sanitization or contextual output escaping. An authenticated administrator submits arbitrary HTML or JavaScript through fields such as Text for block toggle and Custom front css styles. The plugin stores the raw input in the WordPress options table and renders it verbatim on product filter pages. Any visitor loading a page that includes the filter widget triggers the stored payload in their browser context.

The issue is classified under [CWE-79] (Improper Neutralization of Input During Web Page Generation). Persistent XSS in a WooCommerce context exposes shopper sessions, payment workflows, and customer account data. Attackers can pivot from a single compromised administrator account or supply-chain insertion into broad customer impact across every visited page.

Root Cause

The plugin trusts administrator-supplied configuration values and writes them directly into rendered HTML and inline CSS blocks. The code path omits calls to standard WordPress escaping helpers such as esc_html(), esc_attr(), and wp_kses() before output. CSS contexts additionally lack neutralization of expression syntax and </style> breakouts.

Attack Vector

Exploitation requires authenticated access at the privilege level needed to edit plugin settings and a victim visit to a frontend page that renders the affected widget. An attacker navigates to the plugin's design tab, inserts a payload such as a <script> tag or a CSS sequence containing a script-context breakout, and saves the configuration. The payload executes against every subsequent frontend visitor.

Verified proof-of-concept details are available in the Exploit-DB entry #48088 and the VulnCheck advisory on the persistent XSS. No verified patch code is published in the NVD record.

Detection Methods for CVE-2020-37174

Indicators of Compromise

  • Unexpected <script>, onerror=, or javascript: content stored in the wp_options table entries belonging to the WOOF Products Filter plugin.
  • Outbound requests from visitor browsers to attacker-controlled domains originating from product filter pages.
  • Modifications to plugin settings outside of normal change windows, recorded in WordPress audit logs.

Detection Strategies

  • Review the plugin's stored configuration values for HTML or JavaScript tokens that should not appear in design text or CSS fields.
  • Enable Content Security Policy (CSP) reporting and watch for inline-script violations triggered on storefront pages.
  • Compare current plugin option values against a known-good baseline after each administrative change.

Monitoring Recommendations

  • Forward WordPress and web server logs to a centralized analytics platform and alert on administrator settings changes for the WOOF Products Filter plugin.
  • Monitor frontend page responses for unexpected inline script tags or suspicious CSS expressions in filter widget markup.
  • Track anomalous administrator authentication events that precede modifications to plugin design fields.

How to Mitigate CVE-2020-37174

Immediate Actions Required

  • Audit current values in all WOOF Products Filter design tab fields and remove any HTML, JavaScript, or CSS breakout content.
  • Restrict administrative access to trusted accounts and enforce multi-factor authentication for WordPress administrators.
  • Deploy a web application firewall (WAF) rule that blocks <script> and event-handler attributes in plugin settings POST requests.

Patch Information

The NVD record does not list a fixed version. Site operators should upgrade to the latest available release of the WOOF Products Filter for WooCommerce plugin and verify the changelog references sanitization of design tab inputs. If no fixed release is available, replace the plugin with an alternative or disable it.

Workarounds

  • Remove the plugin from WordPress installations that do not require it and clear cached frontend pages after removal.
  • Apply a strict Content Security Policy that disallows inline scripts on storefront pages to neutralize stored payloads.
  • Limit the manage_options and equivalent capabilities to a minimal set of trusted administrators using role management.
bash
# Example CSP header to block inline script execution on WooCommerce pages
Header set Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'; base-uri 'self'"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechWoof Products Filter

  • SeverityMEDIUM

  • CVSS Score4.8

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-79
  • Technical References
  • Products Filter Overview

  • WordPress WooCommerce Plugin

  • Exploit-DB #48088

  • VulnCheck Advisory on XSS
  • Latest CVEs
  • CVE-2026-43328: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43329: Linux Kernel Netfilter DoS Vulnerability

  • CVE-2026-43330: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-43331: Linux Kernel DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English