Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22632: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in totalsoft WooCommerce Pricing – Product Pricing

0
Unknown
VulnerabilityCVE-2025-22632cvecve-2025-22632
Published: Sun Feb 23 2025 (02/23/2025, 22:55:06 UTC)
Source: CVE Database V5
Vendor/Project: totalsoft
Product: WooCommerce Pricing – Product Pricing

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalsoft WooCommerce Pricing – Product Pricing woo-pricing-table allows Stored XSS.This issue affects WooCommerce Pricing – Product Pricing: from n/a through <= 1.0.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:30:19 UTC

Technical Analysis

CVE-2025-22632 identifies a stored cross-site scripting (XSS) vulnerability in the totalsoft WooCommerce Pricing – Product Pricing plugin, specifically versions up to and including 1.0.9. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored persistently within the plugin's data structures. When a victim accesses a page containing the injected payload, the malicious JavaScript executes in their browser context. This can lead to a variety of attacks such as session hijacking, theft of cookies or credentials, defacement, or unauthorized actions performed with the victim's privileges. The plugin is designed to manage product pricing tables within WooCommerce, a widely used e-commerce platform on WordPress. Although no public exploits have been reported yet, the nature of stored XSS makes it a significant risk, especially on sites with many users or administrators who interact with the affected pages. The vulnerability was reserved in early January 2025 and published in late February 2025, but no CVSS score has been assigned. The lack of patches or official fixes at the time of reporting means that affected sites remain vulnerable until remediation is applied. The vulnerability does not require user interaction beyond visiting a compromised page, and no authentication is needed to trigger the exploit if the attacker can inject the payload, increasing its risk profile.

Potential Impact

The impact of CVE-2025-22632 is substantial for organizations running WooCommerce sites with the affected pricing plugin. Successful exploitation can compromise the confidentiality of user data by stealing session tokens or credentials, leading to account takeover. Integrity can be undermined by unauthorized modification of displayed content or pricing information, potentially damaging business reputation and customer trust. Availability is less directly affected but could be impacted if attackers use the vulnerability to inject disruptive scripts or conduct further attacks. E-commerce platforms are high-value targets, and compromised administrative accounts could lead to fraudulent transactions or data breaches. The stored nature of the XSS means that once injected, all users viewing the affected pages are at risk, amplifying the scope of impact. Organizations may face regulatory and compliance consequences if customer data is exposed. The absence of known exploits in the wild provides a window for proactive mitigation, but the vulnerability’s characteristics make it a likely target for attackers once public awareness increases.

Mitigation Recommendations

To mitigate CVE-2025-22632, organizations should immediately check for updates or patches from totalsoft and apply them as soon as they become available. In the absence of official patches, administrators should implement strict input validation and sanitization on all user-supplied data that can be rendered in web pages, especially within the WooCommerce Pricing plugin interfaces. Employing output encoding techniques such as HTML entity encoding before rendering data can prevent script execution. Web application firewalls (WAFs) with XSS detection rules can provide temporary protection by filtering malicious payloads. Regular security audits and code reviews of customizations related to the plugin are recommended. Additionally, limiting administrative access and enforcing least privilege principles reduce the risk of malicious input injection. Monitoring logs for unusual activity or injection attempts can help detect exploitation attempts early. Educating users and administrators about the risks of XSS and safe browsing practices further supports defense-in-depth.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T21:02:24.870Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75fbe6bfc5ba1df08b7f

Added to database: 4/1/2026, 7:46:03 PM

Last enriched: 4/2/2026, 10:30:19 AM

Last updated: 4/6/2026, 11:19:15 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses