Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12123: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Customer Reviews Collector for WooCommerce

0
Medium
VulnerabilityCVE-2025-12123cvecve-2025-12123cwe-79
Published: Thu Nov 27 2025 (11/27/2025, 05:17:38 UTC)
Source: CVE Database V5
Vendor/Project: trustindex
Product: Customer Reviews Collector for WooCommerce

Description

The Customer Reviews Collector for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email-text' parameter in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/04/2025, 06:24:32 UTC

Technical Analysis

CVE-2025-12123 is a reflected Cross-Site Scripting vulnerability identified in the Customer Reviews Collector for WooCommerce plugin for WordPress, affecting all versions up to and including 4.6.1. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'email-text' parameter. This flaw allows unauthenticated attackers to craft malicious URLs containing JavaScript payloads that execute in the context of a victim's browser when the victim clicks the link. The attack vector is network-based with no privileges required, but it requires user interaction, such as clicking a malicious link. The vulnerability impacts the confidentiality and integrity of user data by potentially enabling theft of session cookies, redirection to malicious sites, or manipulation of displayed content. The CVSS v3.1 score is 6.1, reflecting medium severity, with the scope marked as changed due to the potential for cross-origin impact. There are no known exploits in the wild yet, and no official patches have been released at the time of publication. The plugin is widely used in WooCommerce-based e-commerce sites to collect and display customer reviews, making it a valuable target for attackers seeking to compromise user trust or steal sensitive information. The vulnerability is categorized under CWE-79, which is a common and well-understood web application security issue. Mitigation requires either applying vendor patches when available or implementing strict input validation and output encoding on the affected parameter to prevent script injection.

Potential Impact

For European organizations, particularly those operating e-commerce platforms using WooCommerce with the Customer Reviews Collector plugin, this vulnerability poses a risk of client-side script injection leading to session hijacking, phishing, or unauthorized actions performed on behalf of users. The reflected XSS can undermine customer trust by enabling attackers to manipulate review content or redirect users to malicious sites. Confidentiality of user data such as cookies or personal information may be compromised, and integrity of displayed content can be altered, potentially damaging brand reputation and causing financial loss. Although availability is not directly impacted, the indirect effects of successful exploitation can disrupt business operations and customer relations. The medium severity rating indicates a moderate but tangible risk, especially in environments with high user interaction and customer engagement. European e-commerce businesses are increasingly targeted by cybercriminals, making timely mitigation critical to avoid exploitation. The lack of required authentication lowers the barrier for attackers, increasing the likelihood of exploitation if users can be socially engineered to click malicious links.

Mitigation Recommendations

1. Monitor the vendor's official channels for a security patch and apply it immediately upon release. 2. Until a patch is available, implement web application firewall (WAF) rules to detect and block suspicious requests containing malicious scripts in the 'email-text' parameter. 3. Employ strict input validation on all user-supplied parameters, especially 'email-text', ensuring only expected characters and formats are accepted. 4. Apply proper output encoding/escaping in the plugin’s code to neutralize any injected scripts before rendering content in the browser. 5. Educate users and staff about phishing and social engineering risks to reduce the chance of clicking malicious links. 6. Conduct regular security audits and penetration testing focusing on web application input handling. 7. Consider disabling or replacing the vulnerable plugin with a more secure alternative if immediate patching is not feasible. 8. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 9. Keep WordPress core and all plugins/themes updated to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-23T18:21:05.224Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927e15abdf69728cfdf7dec

Added to database: 11/27/2025, 5:27:54 AM

Last enriched: 12/4/2025, 6:24:32 AM

Last updated: 1/11/2026, 12:46:51 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats