Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12191: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ovologics PDF Catalog for WooCommerce

0
Medium
VulnerabilityCVE-2025-12191cvecve-2025-12191cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 05:31:28 UTC)
Source: CVE Database V5
Vendor/Project: ovologics
Product: PDF Catalog for WooCommerce

Description

The PDF Catalog for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdfcatalog' AJAX action in all versions up to, and including, 1.1.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:03:34 UTC

Technical Analysis

CVE-2025-12191 identifies a stored Cross-Site Scripting (XSS) vulnerability in the PDF Catalog for WooCommerce plugin for WordPress, specifically in the 'pdfcatalog' AJAX action. This vulnerability exists in all versions up to and including 1.1.18 due to improper neutralization of input during web page generation, classified under CWE-79. The flaw allows authenticated attackers with Subscriber-level access or higher to inject arbitrary JavaScript code that is stored and executed when other users view the affected pages. The root cause is insufficient input sanitization and lack of proper output escaping, enabling malicious scripts to persist in the application. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No patches are currently linked, and no known exploits have been observed in the wild. Given WooCommerce's popularity in e-commerce, this vulnerability poses a risk of session hijacking, data theft, or unauthorized actions if exploited. Attackers could leverage this to escalate privileges or compromise user accounts. The vulnerability is particularly concerning because even low-privileged users (Subscribers) can exploit it, increasing the attack surface. Organizations using this plugin should prioritize mitigation and monitor for suspicious activity.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability can lead to significant risks. Exploitation could result in theft of user credentials, session hijacking, and unauthorized actions on the website, undermining customer trust and potentially causing financial losses. The medium severity score reflects moderate impact, but the fact that low-privileged users can exploit it increases risk exposure. Confidentiality and integrity of user data are at risk, which may also lead to regulatory compliance issues under GDPR if personal data is compromised. The vulnerability could be leveraged in targeted attacks against businesses with valuable customer data or high transaction volumes. Additionally, reputational damage from a successful attack could be severe in competitive markets. Since WooCommerce is widely used across Europe, the potential impact spans multiple sectors including retail, services, and digital goods. The absence of known exploits in the wild suggests a window for proactive defense, but also means organizations should not be complacent.

Mitigation Recommendations

1. Monitor the vendor’s official channels for patches and apply updates to the PDF Catalog for WooCommerce plugin immediately once available. 2. Until patches are released, restrict Subscriber-level user capabilities to the minimum necessary, or temporarily disable the plugin if feasible. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'pdfcatalog' AJAX action. 4. Conduct regular security audits and code reviews of customizations involving this plugin to identify and remediate unsafe input handling. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. 6. Educate administrators and users about phishing and social engineering risks that could leverage XSS vulnerabilities. 7. Use security plugins that provide enhanced input sanitization and output encoding for WordPress environments. 8. Monitor logs for unusual activity related to AJAX requests and user interactions with the plugin. 9. Limit the number of users with Subscriber-level or higher privileges and enforce strong authentication mechanisms. 10. Prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T20:13:03.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327173f88dbe026c779992

Added to database: 12/5/2025, 5:45:23 AM

Last enriched: 12/5/2025, 6:03:34 AM

Last updated: 12/7/2025, 9:09:07 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats