CVE-2025-13974: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehigh Email Customizer for WooCommerce | Drag and Drop Email Templates Builder
The Email Customizer for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email template content in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in email templates that will execute when customers view transactional emails. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-13974 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Email Customizer for WooCommerce plugin for WordPress. This plugin enables drag-and-drop email template customization for WooCommerce transactional emails. The vulnerability arises from insufficient input sanitization and output escaping of email template content, allowing an authenticated attacker with administrator privileges to inject arbitrary JavaScript code into email templates. The malicious scripts execute when customers open the transactional emails, potentially leading to theft of sensitive information, session hijacking, or other client-side attacks. This vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope to environments with stricter content filtering. The CVSS v3.1 score is 4.4 (medium severity), reflecting the requirement for high privileges (administrator), network attack vector, no user interaction, and partial confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on WooCommerce multisite setups for e-commerce operations. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability could lead to compromise of customer data confidentiality and integrity through malicious script execution in transactional emails. Attackers with admin access could inject scripts that steal customer credentials, perform phishing, or manipulate email content, damaging brand reputation and customer trust. The impact is particularly significant for e-commerce businesses using WooCommerce multisite installations, which are common in larger enterprises or agencies managing multiple stores. Since the attack vector is via email content viewed by customers, the threat extends beyond internal systems to end users, increasing potential regulatory and compliance risks under GDPR. However, the requirement for administrator-level access limits the attack surface to insider threats or compromised admin accounts. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once the vulnerability is public. Organizations could face financial losses, legal consequences, and operational disruptions if exploited.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2. Monitor and audit changes to email templates regularly to detect unauthorized modifications. 3. If possible, disable or limit the use of the Email Customizer for WooCommerce plugin in multisite environments until a patch is available. 4. Implement additional input validation and output escaping in custom email templates to prevent script injection. 5. Educate administrators about the risks of injecting untrusted content into email templates. 6. Use Content Security Policy (CSP) headers in emails where supported to limit script execution. 7. Keep WordPress core, WooCommerce, and all plugins updated and monitor vendor advisories for patches addressing this vulnerability. 8. Consider isolating multisite installations or using separate environments for email customization to reduce attack surface. 9. Employ email scanning and filtering solutions to detect malicious payloads before reaching customers.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13974: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehigh Email Customizer for WooCommerce | Drag and Drop Email Templates Builder
Description
The Email Customizer for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email template content in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in email templates that will execute when customers view transactional emails. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-13974 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Email Customizer for WooCommerce plugin for WordPress. This plugin enables drag-and-drop email template customization for WooCommerce transactional emails. The vulnerability arises from insufficient input sanitization and output escaping of email template content, allowing an authenticated attacker with administrator privileges to inject arbitrary JavaScript code into email templates. The malicious scripts execute when customers open the transactional emails, potentially leading to theft of sensitive information, session hijacking, or other client-side attacks. This vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope to environments with stricter content filtering. The CVSS v3.1 score is 4.4 (medium severity), reflecting the requirement for high privileges (administrator), network attack vector, no user interaction, and partial confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on WooCommerce multisite setups for e-commerce operations. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability could lead to compromise of customer data confidentiality and integrity through malicious script execution in transactional emails. Attackers with admin access could inject scripts that steal customer credentials, perform phishing, or manipulate email content, damaging brand reputation and customer trust. The impact is particularly significant for e-commerce businesses using WooCommerce multisite installations, which are common in larger enterprises or agencies managing multiple stores. Since the attack vector is via email content viewed by customers, the threat extends beyond internal systems to end users, increasing potential regulatory and compliance risks under GDPR. However, the requirement for administrator-level access limits the attack surface to insider threats or compromised admin accounts. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once the vulnerability is public. Organizations could face financial losses, legal consequences, and operational disruptions if exploited.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2. Monitor and audit changes to email templates regularly to detect unauthorized modifications. 3. If possible, disable or limit the use of the Email Customizer for WooCommerce plugin in multisite environments until a patch is available. 4. Implement additional input validation and output escaping in custom email templates to prevent script injection. 5. Educate administrators about the risks of injecting untrusted content into email templates. 6. Use Content Security Policy (CSP) headers in emails where supported to limit script execution. 7. Keep WordPress core, WooCommerce, and all plugins updated and monitor vendor advisories for patches addressing this vulnerability. 8. Consider isolating multisite installations or using separate environments for email customization to reduce attack surface. 9. Employ email scanning and filtering solutions to detect malicious payloads before reaching customers.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T16:03:59.763Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c117349d0379d7d5696
Added to database: 1/7/2026, 12:05:37 PM
Last enriched: 1/7/2026, 12:10:13 PM
Last updated: 1/8/2026, 10:02:01 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.