CVE-2025-12398: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codersaiful Product Table for WooCommerce
The Product Table for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_key' parameter in all versions up to, and including, 5.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-12398 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Product Table for WooCommerce plugin for WordPress, developed by codersaiful. This vulnerability exists in all versions up to and including 5.0.8 due to insufficient sanitization and escaping of the 'search_key' parameter used during web page generation. Reflected XSS occurs when malicious input is immediately returned in the server response without proper neutralization, enabling attackers to inject arbitrary JavaScript code. In this case, an unauthenticated attacker can craft a URL containing malicious script code within the 'search_key' parameter. If a user clicks this link, the injected script executes in their browser context, potentially stealing session cookies, performing actions on behalf of the user, or redirecting them to malicious sites. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity with no effect on availability. No public exploits have been observed yet, but the vulnerability's presence in a popular WordPress e-commerce plugin makes it a notable risk. The reflected XSS can lead to session hijacking, data theft, or defacement, impacting the trustworthiness and security of affected e-commerce platforms.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with the Product Table for WooCommerce plugin, this vulnerability poses a significant risk to customer data confidentiality and the integrity of web sessions. Attackers exploiting this flaw can hijack user sessions, steal sensitive information such as login credentials or payment details, and potentially manipulate user interactions on the site. This can lead to reputational damage, loss of customer trust, and regulatory non-compliance issues under GDPR due to data breaches. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data leakage can disrupt business operations. The risk is heightened for organizations with high web traffic and customer engagement, as the attack requires user interaction. Additionally, phishing campaigns leveraging this vulnerability could target European customers, amplifying the threat. The lack of a current patch increases exposure, necessitating immediate mitigation efforts to prevent exploitation.
Mitigation Recommendations
1. Monitor the vendor's official channels for a security patch and apply it immediately upon release to ensure the vulnerability is fully remediated. 2. Until a patch is available, implement web application firewall (WAF) rules to detect and block requests containing suspicious payloads in the 'search_key' parameter, focusing on typical XSS attack patterns. 3. Employ input validation and output encoding on the server side for all user-supplied data, particularly the 'search_key' parameter, to neutralize malicious scripts. 4. Educate users and staff about the risks of clicking on unsolicited or suspicious links, especially those that appear to come from the affected e-commerce platform. 5. Conduct regular security audits and penetration testing on WordPress plugins and custom code to identify similar vulnerabilities proactively. 6. Consider disabling or replacing the Product Table for WooCommerce plugin with a more secure alternative if immediate patching is not feasible. 7. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS attacks. 8. Ensure all WordPress installations and plugins are kept up to date as part of a robust patch management process.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12398: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codersaiful Product Table for WooCommerce
Description
The Product Table for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_key' parameter in all versions up to, and including, 5.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-12398 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Product Table for WooCommerce plugin for WordPress, developed by codersaiful. This vulnerability exists in all versions up to and including 5.0.8 due to insufficient sanitization and escaping of the 'search_key' parameter used during web page generation. Reflected XSS occurs when malicious input is immediately returned in the server response without proper neutralization, enabling attackers to inject arbitrary JavaScript code. In this case, an unauthenticated attacker can craft a URL containing malicious script code within the 'search_key' parameter. If a user clicks this link, the injected script executes in their browser context, potentially stealing session cookies, performing actions on behalf of the user, or redirecting them to malicious sites. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity with no effect on availability. No public exploits have been observed yet, but the vulnerability's presence in a popular WordPress e-commerce plugin makes it a notable risk. The reflected XSS can lead to session hijacking, data theft, or defacement, impacting the trustworthiness and security of affected e-commerce platforms.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with the Product Table for WooCommerce plugin, this vulnerability poses a significant risk to customer data confidentiality and the integrity of web sessions. Attackers exploiting this flaw can hijack user sessions, steal sensitive information such as login credentials or payment details, and potentially manipulate user interactions on the site. This can lead to reputational damage, loss of customer trust, and regulatory non-compliance issues under GDPR due to data breaches. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data leakage can disrupt business operations. The risk is heightened for organizations with high web traffic and customer engagement, as the attack requires user interaction. Additionally, phishing campaigns leveraging this vulnerability could target European customers, amplifying the threat. The lack of a current patch increases exposure, necessitating immediate mitigation efforts to prevent exploitation.
Mitigation Recommendations
1. Monitor the vendor's official channels for a security patch and apply it immediately upon release to ensure the vulnerability is fully remediated. 2. Until a patch is available, implement web application firewall (WAF) rules to detect and block requests containing suspicious payloads in the 'search_key' parameter, focusing on typical XSS attack patterns. 3. Employ input validation and output encoding on the server side for all user-supplied data, particularly the 'search_key' parameter, to neutralize malicious scripts. 4. Educate users and staff about the risks of clicking on unsolicited or suspicious links, especially those that appear to come from the affected e-commerce platform. 5. Conduct regular security audits and penetration testing on WordPress plugins and custom code to identify similar vulnerabilities proactively. 6. Consider disabling or replacing the Product Table for WooCommerce plugin with a more secure alternative if immediate patching is not feasible. 7. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS attacks. 8. Ensure all WordPress installations and plugins are kept up to date as part of a robust patch management process.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T14:08:43.558Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694770dcdaa649f7237704b7
Added to database: 12/21/2025, 4:00:28 AM
Last enriched: 12/21/2025, 4:01:56 AM
Last updated: 12/21/2025, 3:38:51 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.