CVE-2025-14626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in www15to QR Code for WooCommerce order emails, PDF invoices, packing slips
CVE-2025-14626 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'QR Code for WooCommerce order emails, PDF invoices, packing slips' affecting all versions up to 1. 9. 42. Authenticated users with contributor-level access or higher can inject malicious scripts via the plugin's shortcode due to insufficient input sanitization and output escaping. These scripts execute when other users view the affected pages, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially e-commerce businesses handling sensitive customer data. Mitigation involves promptly updating the plugin once a patch is available or applying manual input sanitization and output escaping.
AI Analysis
Technical Summary
CVE-2025-14626 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the 'QR Code for WooCommerce order emails, PDF invoices, packing slips' WordPress plugin developed by www15to. This vulnerability exists in all plugin versions up to and including 1.9.42. The root cause is insufficient sanitization and escaping of user-supplied attributes in the plugin's shortcode, which allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code. Because the malicious script is stored and rendered in order emails, PDF invoices, and packing slips, it executes whenever a user accesses these pages or documents, potentially affecting administrators, shop managers, or customers. The vulnerability requires network access (AV:N) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction (UI:N). The scope is changed (S:C) because the vulnerability can affect resources beyond the attacker’s privileges, impacting confidentiality and integrity (C:L, I:L) but not availability (A:N). Although no exploits are currently known in the wild, the vulnerability poses a significant risk of session hijacking, credential theft, or unauthorized actions within the WooCommerce environment. The vulnerability was published on January 7, 2026, and no official patches are currently linked, indicating the need for immediate attention by site administrators. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent across Europe.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with this plugin, the vulnerability can lead to unauthorized script execution in administrative or customer-facing contexts. This can result in session hijacking, theft of sensitive customer data such as payment or personal information, unauthorized order manipulation, or defacement of invoices and packing slips. The compromise of administrative accounts could lead to broader site control loss, data breaches, and reputational damage. Given the medium CVSS score and the requirement for contributor-level access, the threat is significant but somewhat mitigated by the need for authentication. However, many European organizations have multiple contributors or shop managers, increasing the attack surface. The vulnerability could also be leveraged in targeted attacks against high-value e-commerce platforms, especially those handling large volumes of transactions or sensitive customer data. Regulatory compliance risks under GDPR are also heightened if customer data confidentiality is compromised.
Mitigation Recommendations
1. Monitor the plugin vendor’s official channels for a security patch and apply updates immediately once available. 2. Until a patch is released, restrict contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement manual input validation and output escaping for all shortcode attributes if possible, using WordPress security best practices and functions such as esc_attr() and esc_html(). 4. Conduct regular security audits of user-generated content and shortcodes to detect any suspicious scripts or injections. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block malicious script patterns targeting the plugin’s shortcode parameters. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Maintain regular backups of WooCommerce data and plugin configurations to enable quick recovery in case of compromise. 8. Monitor logs for unusual activities related to order emails, invoices, and packing slips generation or access.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in www15to QR Code for WooCommerce order emails, PDF invoices, packing slips
Description
CVE-2025-14626 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'QR Code for WooCommerce order emails, PDF invoices, packing slips' affecting all versions up to 1. 9. 42. Authenticated users with contributor-level access or higher can inject malicious scripts via the plugin's shortcode due to insufficient input sanitization and output escaping. These scripts execute when other users view the affected pages, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially e-commerce businesses handling sensitive customer data. Mitigation involves promptly updating the plugin once a patch is available or applying manual input sanitization and output escaping.
AI-Powered Analysis
Technical Analysis
CVE-2025-14626 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the 'QR Code for WooCommerce order emails, PDF invoices, packing slips' WordPress plugin developed by www15to. This vulnerability exists in all plugin versions up to and including 1.9.42. The root cause is insufficient sanitization and escaping of user-supplied attributes in the plugin's shortcode, which allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code. Because the malicious script is stored and rendered in order emails, PDF invoices, and packing slips, it executes whenever a user accesses these pages or documents, potentially affecting administrators, shop managers, or customers. The vulnerability requires network access (AV:N) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction (UI:N). The scope is changed (S:C) because the vulnerability can affect resources beyond the attacker’s privileges, impacting confidentiality and integrity (C:L, I:L) but not availability (A:N). Although no exploits are currently known in the wild, the vulnerability poses a significant risk of session hijacking, credential theft, or unauthorized actions within the WooCommerce environment. The vulnerability was published on January 7, 2026, and no official patches are currently linked, indicating the need for immediate attention by site administrators. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent across Europe.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with this plugin, the vulnerability can lead to unauthorized script execution in administrative or customer-facing contexts. This can result in session hijacking, theft of sensitive customer data such as payment or personal information, unauthorized order manipulation, or defacement of invoices and packing slips. The compromise of administrative accounts could lead to broader site control loss, data breaches, and reputational damage. Given the medium CVSS score and the requirement for contributor-level access, the threat is significant but somewhat mitigated by the need for authentication. However, many European organizations have multiple contributors or shop managers, increasing the attack surface. The vulnerability could also be leveraged in targeted attacks against high-value e-commerce platforms, especially those handling large volumes of transactions or sensitive customer data. Regulatory compliance risks under GDPR are also heightened if customer data confidentiality is compromised.
Mitigation Recommendations
1. Monitor the plugin vendor’s official channels for a security patch and apply updates immediately once available. 2. Until a patch is released, restrict contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement manual input validation and output escaping for all shortcode attributes if possible, using WordPress security best practices and functions such as esc_attr() and esc_html(). 4. Conduct regular security audits of user-generated content and shortcodes to detect any suspicious scripts or injections. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block malicious script patterns targeting the plugin’s shortcode parameters. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Maintain regular backups of WooCommerce data and plugin configurations to enable quick recovery in case of compromise. 8. Monitor logs for unusual activities related to order emails, invoices, and packing slips generation or access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-12T21:29:38.339Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c147349d0379d7d5814
Added to database: 1/7/2026, 12:05:40 PM
Last enriched: 1/14/2026, 3:58:23 PM
Last updated: 2/7/2026, 7:29:29 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.