Step 1: Payload Delivery: The attacker crafts a malicious URL containing a JavaScript payload within a specific parameter that the ShopBuilder plugin processes.
Step 2: User Interaction: The attacker lures a privileged user (e.g., an administrator) to click the crafted URL, perhaps through phishing or social engineering.
Step 3: Payload Execution: When the user clicks the malicious URL, the browser sends the request to the vulnerable ShopBuilder plugin. The plugin, due to the lack of sanitization, includes the attacker's JavaScript payload in the response.
Step 4: Code Rendering: The user's browser receives the response containing the malicious JavaScript and executes it.
Step 5: Attack Execution: The executed JavaScript can perform various malicious actions, such as stealing the user's session cookies, redirecting the user to a phishing site, or modifying the website's content.