CVE-2025-12191: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ovologics PDF Catalog for WooCommerce
The PDF Catalog for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdfcatalog' AJAX action in all versions up to, and including, 1.1.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12191 identifies a stored Cross-Site Scripting (XSS) vulnerability in the PDF Catalog for WooCommerce plugin for WordPress, specifically in the 'pdfcatalog' AJAX action. This vulnerability exists in all versions up to and including 1.1.18 due to improper neutralization of input during web page generation, classified under CWE-79. The flaw allows authenticated attackers with Subscriber-level access or higher to inject arbitrary JavaScript code that is stored and executed when other users view the affected pages. The root cause is insufficient input sanitization and lack of proper output escaping, enabling malicious scripts to persist in the application. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches are currently linked, and no known exploits have been observed in the wild. Given WooCommerce's popularity in e-commerce, this vulnerability poses a risk of session hijacking, data theft, or unauthorized actions if exploited. Attackers could leverage this to escalate privileges or compromise user accounts. The vulnerability is particularly concerning because even low-privileged users (Subscribers) can exploit it, increasing the attack surface. Organizations using this plugin should prioritize mitigation and monitor for suspicious activity.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability can lead to significant risks. Exploitation could result in theft of user credentials, session hijacking, and unauthorized actions on the website, undermining customer trust and potentially causing financial losses. The medium severity score reflects moderate impact, but the fact that low-privileged users can exploit it increases risk exposure. Confidentiality and integrity of user data are at risk, which may also lead to regulatory compliance issues under GDPR if personal data is compromised. The vulnerability could be leveraged in targeted attacks against businesses with valuable customer data or high transaction volumes. Additionally, reputational damage from a successful attack could be severe in competitive markets. Since WooCommerce is widely used across Europe, the potential impact spans multiple sectors including retail, services, and digital goods. The absence of known exploits in the wild suggests a window for proactive defense, but also means organizations should not be complacent.
Mitigation Recommendations
1. Monitor the vendor’s official channels for patches and apply updates to the PDF Catalog for WooCommerce plugin immediately once available. 2. Until patches are released, restrict Subscriber-level user capabilities to the minimum necessary, or temporarily disable the plugin if feasible. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'pdfcatalog' AJAX action. 4. Conduct regular security audits and code reviews of customizations involving this plugin to identify and remediate unsafe input handling. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. 6. Educate administrators and users about phishing and social engineering risks that could leverage XSS vulnerabilities. 7. Use security plugins that provide enhanced input sanitization and output encoding for WordPress environments. 8. Monitor logs for unusual activity related to AJAX requests and user interactions with the plugin. 9. Limit the number of users with Subscriber-level or higher privileges and enforce strong authentication mechanisms. 10. Prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-12191: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ovologics PDF Catalog for WooCommerce
Description
The PDF Catalog for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdfcatalog' AJAX action in all versions up to, and including, 1.1.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-12191 identifies a stored Cross-Site Scripting (XSS) vulnerability in the PDF Catalog for WooCommerce plugin for WordPress, specifically in the 'pdfcatalog' AJAX action. This vulnerability exists in all versions up to and including 1.1.18 due to improper neutralization of input during web page generation, classified under CWE-79. The flaw allows authenticated attackers with Subscriber-level access or higher to inject arbitrary JavaScript code that is stored and executed when other users view the affected pages. The root cause is insufficient input sanitization and lack of proper output escaping, enabling malicious scripts to persist in the application. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches are currently linked, and no known exploits have been observed in the wild. Given WooCommerce's popularity in e-commerce, this vulnerability poses a risk of session hijacking, data theft, or unauthorized actions if exploited. Attackers could leverage this to escalate privileges or compromise user accounts. The vulnerability is particularly concerning because even low-privileged users (Subscribers) can exploit it, increasing the attack surface. Organizations using this plugin should prioritize mitigation and monitor for suspicious activity.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability can lead to significant risks. Exploitation could result in theft of user credentials, session hijacking, and unauthorized actions on the website, undermining customer trust and potentially causing financial losses. The medium severity score reflects moderate impact, but the fact that low-privileged users can exploit it increases risk exposure. Confidentiality and integrity of user data are at risk, which may also lead to regulatory compliance issues under GDPR if personal data is compromised. The vulnerability could be leveraged in targeted attacks against businesses with valuable customer data or high transaction volumes. Additionally, reputational damage from a successful attack could be severe in competitive markets. Since WooCommerce is widely used across Europe, the potential impact spans multiple sectors including retail, services, and digital goods. The absence of known exploits in the wild suggests a window for proactive defense, but also means organizations should not be complacent.
Mitigation Recommendations
1. Monitor the vendor’s official channels for patches and apply updates to the PDF Catalog for WooCommerce plugin immediately once available. 2. Until patches are released, restrict Subscriber-level user capabilities to the minimum necessary, or temporarily disable the plugin if feasible. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'pdfcatalog' AJAX action. 4. Conduct regular security audits and code reviews of customizations involving this plugin to identify and remediate unsafe input handling. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. 6. Educate administrators and users about phishing and social engineering risks that could leverage XSS vulnerabilities. 7. Use security plugins that provide enhanced input sanitization and output encoding for WordPress environments. 8. Monitor logs for unusual activity related to AJAX requests and user interactions with the plugin. 9. Limit the number of users with Subscriber-level or higher privileges and enforce strong authentication mechanisms. 10. Prepare incident response plans to quickly address any detected exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T20:13:03.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327173f88dbe026c779992
Added to database: 12/5/2025, 5:45:23 AM
Last enriched: 12/5/2025, 6:03:34 AM
Last updated: 12/7/2025, 9:09:07 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14187: Buffer Overflow in UGREEN DH2100+
HighCVE-2025-14186: Basic Cross Site Scripting in Grandstream GXP1625
MediumCVE-2025-14185: SQL Injection in Yonyou U8 Cloud
MediumCVE-2025-14184: Command Injection in SGAI Space1 NAS N1211DS
MediumCVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.