CVE-2025-15380: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam NotificationX – FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar
The NotificationX – FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via the 'nx-preview' POST parameter in all versions up to, and including, 3.2.0. This is due to insufficient input sanitization and output escaping when processing preview data. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute when a user visits a malicious page that auto-submits a form to the vulnerable site.
AI Analysis
Technical Summary
CVE-2025-15380 is a DOM-based Cross-Site Scripting vulnerability identified in the WordPress plugin NotificationX – a widely used tool for displaying live sales notifications, social proof, GDPR banners, and other marketing popups. The vulnerability stems from insufficient sanitization and escaping of the 'nx-preview' POST parameter, which is used during previewing notification content. An attacker can craft a malicious web page that auto-submits a form containing a payload in this parameter to the vulnerable WordPress site. Because the plugin processes this input insecurely, the injected script executes in the context of the victim's browser when visiting the malicious page, leading to DOM-based XSS. This attack vector requires no authentication or user interaction, increasing its severity. The vulnerability affects all versions up to and including 3.2.0 of NotificationX. The CVSS 3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential impact on other components. The impact includes partial confidentiality and integrity loss, as attackers can steal cookies, session tokens, or perform actions on behalf of the user. No patches or exploit code are currently publicly available, but the vulnerability is published and should be treated as a high priority for remediation. NotificationX is popular among WordPress sites that use WooCommerce and marketing tools, making e-commerce platforms particularly vulnerable. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially plugins that handle dynamic content injection.
Potential Impact
For European organizations, especially those operating e-commerce platforms or marketing websites using WordPress and NotificationX, this vulnerability poses a significant risk. Successful exploitation can lead to session hijacking, theft of sensitive user data, unauthorized actions on behalf of users, and potential defacement or redirection attacks. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and cause financial losses. The vulnerability’s unauthenticated and no user interaction requirements increase the likelihood of automated exploitation attempts. Given the widespread use of WordPress in Europe and the popularity of WooCommerce, many SMEs and large enterprises could be affected. Additionally, the scope change in the CVSS vector indicates that the vulnerability could impact other components or users beyond the immediate plugin context, amplifying the potential damage. While no known exploits are currently reported, the public disclosure increases the risk of future exploitation, necessitating proactive defense measures.
Mitigation Recommendations
1. Monitor the NotificationX plugin vendor’s announcements closely and apply security patches immediately once they become available. 2. If patches are not yet released, consider temporarily disabling the NotificationX plugin or the preview functionality that processes the 'nx-preview' POST parameter to eliminate the attack surface. 3. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests containing malicious payloads targeting the 'nx-preview' parameter. 5. Conduct regular security audits and penetration testing focusing on input validation and output encoding in all plugins and themes. 6. Educate web administrators and developers about secure coding practices, especially regarding DOM-based XSS vectors. 7. Employ security plugins that can detect and mitigate XSS attacks in WordPress environments. 8. Review user session management and cookie security settings to minimize the impact of potential session hijacking.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15380: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam NotificationX – FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar
Description
The NotificationX – FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via the 'nx-preview' POST parameter in all versions up to, and including, 3.2.0. This is due to insufficient input sanitization and output escaping when processing preview data. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute when a user visits a malicious page that auto-submits a form to the vulnerable site.
AI-Powered Analysis
Technical Analysis
CVE-2025-15380 is a DOM-based Cross-Site Scripting vulnerability identified in the WordPress plugin NotificationX – a widely used tool for displaying live sales notifications, social proof, GDPR banners, and other marketing popups. The vulnerability stems from insufficient sanitization and escaping of the 'nx-preview' POST parameter, which is used during previewing notification content. An attacker can craft a malicious web page that auto-submits a form containing a payload in this parameter to the vulnerable WordPress site. Because the plugin processes this input insecurely, the injected script executes in the context of the victim's browser when visiting the malicious page, leading to DOM-based XSS. This attack vector requires no authentication or user interaction, increasing its severity. The vulnerability affects all versions up to and including 3.2.0 of NotificationX. The CVSS 3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential impact on other components. The impact includes partial confidentiality and integrity loss, as attackers can steal cookies, session tokens, or perform actions on behalf of the user. No patches or exploit code are currently publicly available, but the vulnerability is published and should be treated as a high priority for remediation. NotificationX is popular among WordPress sites that use WooCommerce and marketing tools, making e-commerce platforms particularly vulnerable. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially plugins that handle dynamic content injection.
Potential Impact
For European organizations, especially those operating e-commerce platforms or marketing websites using WordPress and NotificationX, this vulnerability poses a significant risk. Successful exploitation can lead to session hijacking, theft of sensitive user data, unauthorized actions on behalf of users, and potential defacement or redirection attacks. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and cause financial losses. The vulnerability’s unauthenticated and no user interaction requirements increase the likelihood of automated exploitation attempts. Given the widespread use of WordPress in Europe and the popularity of WooCommerce, many SMEs and large enterprises could be affected. Additionally, the scope change in the CVSS vector indicates that the vulnerability could impact other components or users beyond the immediate plugin context, amplifying the potential damage. While no known exploits are currently reported, the public disclosure increases the risk of future exploitation, necessitating proactive defense measures.
Mitigation Recommendations
1. Monitor the NotificationX plugin vendor’s announcements closely and apply security patches immediately once they become available. 2. If patches are not yet released, consider temporarily disabling the NotificationX plugin or the preview functionality that processes the 'nx-preview' POST parameter to eliminate the attack surface. 3. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests containing malicious payloads targeting the 'nx-preview' parameter. 5. Conduct regular security audits and penetration testing focusing on input validation and output encoding in all plugins and themes. 6. Educate web administrators and developers about secure coding practices, especially regarding DOM-based XSS vectors. 7. Employ security plugins that can detect and mitigate XSS attacks in WordPress environments. 8. Review user session management and cookie security settings to minimize the impact of potential session hijacking.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-30T21:36:36.412Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f99da4623b1157c3aa4e1
Added to database: 1/20/2026, 3:06:02 PM
Last enriched: 1/20/2026, 3:20:18 PM
Last updated: 1/21/2026, 10:03:01 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23516: CWE-83: Improper Neutralization of Script in Attributes in a Web Page in cvat-ai cvat
HighCVE-2026-22808: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fleetdm fleet
MediumCVE-2026-22807: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2026-22793: CWE-94: Improper Control of Generation of Code ('Code Injection') in nanbingxyz 5ire
CriticalCVE-2026-22792: CWE-116: Improper Encoding or Escaping of Output in nanbingxyz 5ire
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.