Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10651: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in uscnanbu Welcart e-Commerce

0
Medium
VulnerabilityCVE-2025-10651cvecve-2025-10651cwe-79
Published: Wed Oct 22 2025 (10/22/2025, 05:27:56 UTC)
Source: CVE Database V5
Vendor/Project: uscnanbu
Product: Welcart e-Commerce

Description

The Welcart e-Commerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'order_mail' setting in versions up to, and including, 2.11.22. This is due to insufficient sanitization on the order_mail field and a lack of escaping on output. This makes it possible for authenticated attackers, with Editor-level permissions and above, to inject arbitrary web scripts via the General Setting page that will execute when an administrator accesses the E-mail Setting page.

AI-Powered Analysis

AILast updated: 10/29/2025, 06:20:05 UTC

Technical Analysis

CVE-2025-10651 is a stored cross-site scripting vulnerability identified in the Welcart e-Commerce plugin for WordPress, a popular e-commerce solution primarily used in Japan but also adopted internationally. The vulnerability exists in versions up to and including 2.11.22 due to improper neutralization of input (CWE-79) in the 'order_mail' setting. Specifically, the plugin fails to sufficiently sanitize user input on this field and does not escape output when rendering the E-mail Setting page. This flaw allows an authenticated attacker with Editor-level or higher permissions to inject arbitrary JavaScript code into the 'order_mail' field via the General Setting page. When an administrator subsequently visits the E-mail Setting page, the malicious script executes in their browser context. This can lead to session hijacking, privilege escalation, or other malicious actions within the administrative interface. The vulnerability requires no user interaction beyond the administrator visiting the affected page, but it does require the attacker to have elevated privileges (Editor or above). The CVSS 3.1 base score is 5.5, reflecting medium severity with network attack vector, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No public exploits are currently known, and no official patches have been linked yet. The vulnerability highlights the importance of proper input validation and output escaping in web applications, especially in plugins that handle sensitive administrative settings.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to the confidentiality and integrity of administrative accounts and data within WordPress environments using the Welcart e-Commerce plugin. An attacker exploiting this flaw could execute arbitrary scripts in the context of an administrator, potentially leading to session hijacking, unauthorized changes to e-commerce settings, or theft of sensitive information such as customer data and order details. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. Since the vulnerability requires Editor-level access, it could be exploited by insider threats or compromised accounts. The scope is limited to organizations using the affected plugin versions, but given WordPress’s widespread use in Europe and the popularity of e-commerce solutions, the impact could be broad. The lack of known exploits reduces immediate risk, but the medium severity score indicates that timely mitigation is necessary to prevent future attacks.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately audit user roles and restrict Editor-level and higher permissions to trusted personnel only, minimizing the attack surface. 2) Monitor and review changes to the 'order_mail' setting and other administrative configurations for suspicious activity. 3) Implement web application firewalls (WAFs) with rules to detect and block malicious script injections targeting the 'order_mail' parameter. 4) Apply strict input validation and output escaping in custom code or request the vendor to release a patch addressing the sanitization and escaping issues. 5) Educate administrators to avoid visiting untrusted or suspicious pages within the WordPress dashboard. 6) Regularly update WordPress and plugins to the latest versions once patches become available. 7) Consider isolating administrative interfaces behind VPNs or IP whitelisting to reduce exposure. These steps go beyond generic advice by focusing on role management, monitoring, and proactive filtering tailored to this vulnerability’s characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-17T19:03:50.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f86dad5aedc7cf04246c48

Added to database: 10/22/2025, 5:37:49 AM

Last enriched: 10/29/2025, 6:20:05 AM

Last updated: 10/29/2025, 8:24:19 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats