Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22314: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WP Scripts Food Store – Online Food Delivery & Pickup

0
Unknown
VulnerabilityCVE-2025-22314cvecve-2025-22314
Published: Mon Jan 13 2025 (01/13/2025, 13:11:36 UTC)
Source: CVE Database V5
Vendor/Project: WP Scripts
Product: Food Store – Online Food Delivery & Pickup

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Scripts Food Store – Online Food Delivery & Pickup food-store allows Reflected XSS.This issue affects Food Store – Online Food Delivery & Pickup: from n/a through <= 1.5.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:08:45 UTC

Technical Analysis

CVE-2025-22314 identifies a reflected Cross-site Scripting (XSS) vulnerability in the WordPress plugin 'Food Store – Online Food Delivery & Pickup' developed by WP Scripts, affecting all versions up to and including 1.5.4. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed in the browsers of users who visit crafted URLs. This reflected XSS does not require prior authentication, making it accessible to remote attackers who can lure victims into clicking malicious links. The injected scripts can execute arbitrary JavaScript code, potentially leading to session hijacking, theft of cookies or credentials, defacement, or redirection to malicious sites. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and should be considered exploitable. The plugin is commonly used by WordPress sites providing online food ordering and pickup services, which often handle sensitive customer data and payment information. The lack of a patch link suggests that a fix may not yet be available, underscoring the urgency for users to monitor vendor updates. The vulnerability highlights the importance of proper input validation and output encoding in web applications to prevent injection attacks. Organizations using this plugin should prioritize mitigation to prevent potential compromise of their web properties and customer data.

Potential Impact

The impact of CVE-2025-22314 can be significant for organizations operating online food delivery and pickup services using the affected WordPress plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of users' browsers, potentially leading to theft of session cookies, user credentials, and personal information. This can result in unauthorized access to user accounts, fraudulent transactions, and reputational damage. Additionally, attackers may use the vulnerability to perform phishing attacks by injecting deceptive content or redirecting users to malicious websites. The compromise of customer trust and potential regulatory penalties for data breaches could have financial and operational consequences. Since the vulnerability does not require authentication, it can be exploited at scale by targeting users through social engineering or malicious links. The availability of the service could also be impacted if attackers leverage the vulnerability to deface websites or disrupt normal operations. Overall, the threat poses a high risk to confidentiality, integrity, and to a lesser extent, availability of affected systems and data.

Mitigation Recommendations

To mitigate CVE-2025-22314, organizations should: 1) Monitor WP Scripts' official channels for a security patch and apply updates immediately once available. 2) In the interim, implement a Web Application Firewall (WAF) with rules to detect and block reflected XSS payloads targeting the plugin's endpoints. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Review and harden input validation and output encoding mechanisms within the plugin if custom modifications exist. 5) Educate users and staff about the risks of clicking untrusted links to reduce the likelihood of successful social engineering. 6) Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 7) Consider temporarily disabling or replacing the plugin with a more secure alternative if patching is delayed. These steps go beyond generic advice by focusing on layered defenses and proactive monitoring specific to this plugin's context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:16:10.261Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75d9e6bfc5ba1df0813c

Added to database: 4/1/2026, 7:45:29 PM

Last enriched: 4/2/2026, 10:08:45 AM

Last updated: 4/6/2026, 2:59:25 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses