Skip to main content

CVE-2025-1288: CWE-79 Cross-Site Scripting (XSS) in WOOEXIM

Medium
VulnerabilityCVE-2025-1288cvecve-2025-1288cwe-79cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:07:26 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WOOEXIM

Description

The WOOEXIM WordPress plugin through 5.0.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make an unauthenticated user vulnerable to reflected XSS via a CSRF attack.

AI-Powered Analysis

AILast updated: 07/06/2025, 06:57:11 UTC

Technical Analysis

CVE-2025-1288 is a medium-severity vulnerability affecting the WOOEXIM WordPress plugin versions up to 5.0.0. The vulnerability arises from the absence of Cross-Site Request Forgery (CSRF) protections in certain parts of the plugin, combined with insufficient input sanitization and output escaping. This combination enables an attacker to exploit a reflected Cross-Site Scripting (XSS) vulnerability via a CSRF attack vector. Specifically, an unauthenticated attacker can craft a malicious request that, when executed by a victim user, causes the victim's browser to execute attacker-controlled JavaScript code. The vulnerability is characterized by CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-352 (Cross-Site Request Forgery). The CVSS v3.1 base score is 6.1, reflecting a network attack vector with low attack complexity, no privileges required, but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity to a low degree, with no impact on availability. No known exploits are currently reported in the wild, and no official patches or fixes have been linked yet. The vulnerability was published in May 2025 and was assigned by WPScan with enrichment from CISA. The lack of CSRF tokens and missing sanitization/escaping in the plugin's codebase allows attackers to inject malicious scripts that could steal session cookies, perform actions on behalf of the user, or redirect users to malicious sites, potentially leading to account compromise or data leakage within WordPress sites using this plugin.

Potential Impact

For European organizations using WordPress sites with the WOOEXIM plugin, this vulnerability poses a tangible risk to website integrity and user trust. Exploitation could lead to unauthorized actions performed in the context of legitimate users, data leakage, or session hijacking. This is particularly concerning for e-commerce or business-critical websites that rely on WOOEXIM for import/export functionality, as attackers could manipulate site content or user sessions. The reflected XSS via CSRF means that attackers can target users with crafted links or web pages, potentially affecting employees, customers, or partners interacting with the affected sites. While the vulnerability does not directly impact availability, the reputational damage and potential data confidentiality breaches could be significant. Additionally, the scope change indicates that the impact could extend beyond the plugin itself, affecting other components or user data within the WordPress environment. Given the widespread use of WordPress across Europe, especially in small and medium enterprises, this vulnerability could have broad implications if left unmitigated.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the WOOEXIM plugin until a patch is available. 2. Website administrators should implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF and XSS payloads targeting the plugin's endpoints. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 4. Review and harden WordPress security settings, including enforcing strict user roles and permissions to limit the impact of any successful exploitation. 5. Educate users and administrators about the risks of clicking on untrusted links, as user interaction is required for exploitation. 6. Monitor website logs for unusual requests or patterns indicative of attempted exploitation. 7. Once available, promptly apply official patches or updates from the plugin vendor. 8. Consider implementing additional input validation and output encoding at the application level if customizations exist. 9. Regularly audit all installed plugins for security compliance and timely updates to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-02-13T20:33:41.403Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac6c

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/6/2025, 6:57:11 AM

Last updated: 8/16/2025, 4:49:23 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats