Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13974: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehigh Email Customizer for WooCommerce | Drag and Drop Email Templates Builder

0
Medium
VulnerabilityCVE-2025-13974cvecve-2025-13974cwe-79
Published: Wed Jan 07 2026 (01/07/2026, 09:21:03 UTC)
Source: CVE Database V5
Vendor/Project: themehigh
Product: Email Customizer for WooCommerce | Drag and Drop Email Templates Builder

Description

The Email Customizer for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email template content in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in email templates that will execute when customers view transactional emails. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 01/07/2026, 12:10:13 UTC

Technical Analysis

CVE-2025-13974 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Email Customizer for WooCommerce plugin for WordPress. This plugin enables drag-and-drop email template customization for WooCommerce transactional emails. The vulnerability arises from insufficient input sanitization and output escaping of email template content, allowing an authenticated attacker with administrator privileges to inject arbitrary JavaScript code into email templates. The malicious scripts execute when customers open the transactional emails, potentially leading to theft of sensitive information, session hijacking, or other client-side attacks. This vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope to environments with stricter content filtering. The CVSS v3.1 score is 4.4 (medium severity), reflecting the requirement for high privileges (administrator), network attack vector, no user interaction, and partial confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on WooCommerce multisite setups for e-commerce operations. The lack of patch links suggests that a fix may not yet be available or publicly disclosed, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, this vulnerability could lead to compromise of customer data confidentiality and integrity through malicious script execution in transactional emails. Attackers with admin access could inject scripts that steal customer credentials, perform phishing, or manipulate email content, damaging brand reputation and customer trust. The impact is particularly significant for e-commerce businesses using WooCommerce multisite installations, which are common in larger enterprises or agencies managing multiple stores. Since the attack vector is via email content viewed by customers, the threat extends beyond internal systems to end users, increasing potential regulatory and compliance risks under GDPR. However, the requirement for administrator-level access limits the attack surface to insider threats or compromised admin accounts. The absence of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits once the vulnerability is public. Organizations could face financial losses, legal consequences, and operational disruptions if exploited.

Mitigation Recommendations

1. Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2. Monitor and audit changes to email templates regularly to detect unauthorized modifications. 3. If possible, disable or limit the use of the Email Customizer for WooCommerce plugin in multisite environments until a patch is available. 4. Implement additional input validation and output escaping in custom email templates to prevent script injection. 5. Educate administrators about the risks of injecting untrusted content into email templates. 6. Use Content Security Policy (CSP) headers in emails where supported to limit script execution. 7. Keep WordPress core, WooCommerce, and all plugins updated and monitor vendor advisories for patches addressing this vulnerability. 8. Consider isolating multisite installations or using separate environments for email customization to reduce attack surface. 9. Employ email scanning and filtering solutions to detect malicious payloads before reaching customers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T16:03:59.763Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c117349d0379d7d5696

Added to database: 1/7/2026, 12:05:37 PM

Last enriched: 1/7/2026, 12:10:13 PM

Last updated: 1/8/2026, 10:02:01 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats