Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12398: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codersaiful Product Table for WooCommerce

0
Medium
VulnerabilityCVE-2025-12398cvecve-2025-12398cwe-79
Published: Sun Dec 21 2025 (12/21/2025, 03:20:04 UTC)
Source: CVE Database V5
Vendor/Project: codersaiful
Product: Product Table for WooCommerce

Description

The Product Table for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_key' parameter in all versions up to, and including, 5.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/21/2025, 04:01:56 UTC

Technical Analysis

CVE-2025-12398 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Product Table for WooCommerce plugin for WordPress, developed by codersaiful. This vulnerability exists in all versions up to and including 5.0.8 due to insufficient sanitization and escaping of the 'search_key' parameter used during web page generation. Reflected XSS occurs when malicious input is immediately returned in the server response without proper neutralization, enabling attackers to inject arbitrary JavaScript code. In this case, an unauthenticated attacker can craft a URL containing malicious script code within the 'search_key' parameter. If a user clicks this link, the injected script executes in their browser context, potentially stealing session cookies, performing actions on behalf of the user, or redirecting them to malicious sites. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality and integrity with no effect on availability. No public exploits have been observed yet, but the vulnerability's presence in a popular WordPress e-commerce plugin makes it a notable risk. The reflected XSS can lead to session hijacking, data theft, or defacement, impacting the trustworthiness and security of affected e-commerce platforms.

Potential Impact

For European organizations, especially those operating e-commerce websites using WordPress with the Product Table for WooCommerce plugin, this vulnerability poses a significant risk to customer data confidentiality and the integrity of web sessions. Attackers exploiting this flaw can hijack user sessions, steal sensitive information such as login credentials or payment details, and potentially manipulate user interactions on the site. This can lead to reputational damage, loss of customer trust, and regulatory non-compliance issues under GDPR due to data breaches. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data leakage can disrupt business operations. The risk is heightened for organizations with high web traffic and customer engagement, as the attack requires user interaction. Additionally, phishing campaigns leveraging this vulnerability could target European customers, amplifying the threat. The lack of a current patch increases exposure, necessitating immediate mitigation efforts to prevent exploitation.

Mitigation Recommendations

1. Monitor the vendor's official channels for a security patch and apply it immediately upon release to ensure the vulnerability is fully remediated. 2. Until a patch is available, implement web application firewall (WAF) rules to detect and block requests containing suspicious payloads in the 'search_key' parameter, focusing on typical XSS attack patterns. 3. Employ input validation and output encoding on the server side for all user-supplied data, particularly the 'search_key' parameter, to neutralize malicious scripts. 4. Educate users and staff about the risks of clicking on unsolicited or suspicious links, especially those that appear to come from the affected e-commerce platform. 5. Conduct regular security audits and penetration testing on WordPress plugins and custom code to identify similar vulnerabilities proactively. 6. Consider disabling or replacing the Product Table for WooCommerce plugin with a more secure alternative if immediate patching is not feasible. 7. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS attacks. 8. Ensure all WordPress installations and plugins are kept up to date as part of a robust patch management process.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T14:08:43.558Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694770dcdaa649f7237704b7

Added to database: 12/21/2025, 4:00:28 AM

Last enriched: 12/21/2025, 4:01:56 AM

Last updated: 12/21/2025, 3:38:51 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats