Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smartsupp Smartsupp – live chat, AI shopping assistant and chatbots

0
Medium
VulnerabilityCVE-2025-12448cvecve-2025-12448cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 03:25:11 UTC)
Source: CVE Database V5
Vendor/Project: smartsupp
Product: Smartsupp – live chat, AI shopping assistant and chatbots

Description

The Smartsupp – live chat, AI shopping assistant and chatbots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'code' parameter in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 02/19/2026, 04:29:26 UTC

Technical Analysis

CVE-2025-12448 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the Smartsupp WordPress plugin, which provides live chat, AI shopping assistant, and chatbot functionalities. The vulnerability arises from insufficient sanitization and escaping of user-supplied input in the 'code' parameter, allowing authenticated users with Subscriber-level privileges or higher to inject arbitrary JavaScript code. Because the injected scripts are stored and rendered on pages accessed by other users, this can lead to persistent XSS attacks. The vulnerability does not require user interaction to trigger once the malicious script is stored, and it affects all plugin versions up to and including 3.9.1. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed, indicating that the vulnerability can impact resources beyond the initially vulnerable component, potentially affecting the confidentiality and integrity of user data. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WordPress and the plugin’s role in customer engagement. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deliver malware. The lack of a patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.

Potential Impact

For European organizations, especially those operating e-commerce platforms, customer support portals, or any WordPress-based websites using the Smartsupp plugin, this vulnerability poses a risk of unauthorized script execution leading to data theft, session hijacking, and potential compromise of user accounts. The persistent nature of the XSS means that once exploited, multiple users can be affected over time, increasing the potential damage. Confidentiality and integrity of user data are at risk, while availability is less impacted. Given the medium CVSS score and the requirement for authenticated access, the threat is moderate but significant in environments with many users and varied privilege levels. Attackers could leverage this vulnerability to escalate privileges or conduct phishing campaigns within the affected sites. The impact is amplified in sectors with sensitive customer data such as finance, retail, and healthcare. Additionally, regulatory compliance under GDPR mandates prompt remediation of such vulnerabilities to avoid legal and financial penalties.

Mitigation Recommendations

1. Immediately restrict or audit user roles with Subscriber-level access or higher to limit who can input data into the 'code' parameter. 2. Monitor and review all user-generated content in the Smartsupp plugin for suspicious scripts or anomalies. 3. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the plugin. 4. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 5. Regularly update the Smartsupp plugin as soon as the vendor releases a security patch addressing this vulnerability. 6. Employ additional input validation and output encoding at the application level to mitigate injection risks. 7. Conduct security awareness training for administrators and users about the risks of XSS and safe plugin usage. 8. Use security plugins that can detect and quarantine malicious scripts in WordPress environments. 9. Perform periodic vulnerability scans and penetration tests focusing on the Smartsupp plugin and related components. 10. Maintain comprehensive logging and monitoring to detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T20:17:58.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69968d636aea4a407a3900e1

Added to database: 2/19/2026, 4:11:15 AM

Last enriched: 2/19/2026, 4:29:26 AM

Last updated: 2/21/2026, 2:16:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats