Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39497: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dokan Dokan Pro

0
Medium
VulnerabilityCVE-2025-39497cvecve-2025-39497cwe-79
Published: Mon Jan 05 2026 (01/05/2026, 16:51:39 UTC)
Source: CVE Database V5
Vendor/Project: Dokan
Product: Dokan Pro

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dokan Dokan Pro allows Stored XSS.This issue affects Dokan Pro: from n/a through 3.14.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:48:53 UTC

Technical Analysis

CVE-2025-39497 identifies a stored Cross-site Scripting (XSS) vulnerability in Dokan Pro, a widely used WordPress plugin that enables multi-vendor marketplace functionality. The vulnerability stems from CWE-79: improper neutralization of input during web page generation, which allows malicious actors to inject and store arbitrary JavaScript code within the application. When other users or administrators access the affected pages, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim’s privileges. The vulnerability affects Dokan Pro versions up to 3.14.5, with no earlier version specified. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be launched remotely over the network with low complexity, requires some privileges (likely a vendor or authenticated user), and user interaction (such as viewing a malicious page) is necessary. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes partial loss of confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability is classified as medium severity. The lack of available patches at the time of reporting suggests that organizations should prioritize monitoring and interim mitigations until updates are released.

Potential Impact

For European organizations, especially those operating e-commerce platforms using Dokan Pro, this vulnerability poses significant risks. Attackers could exploit stored XSS to hijack user sessions, steal sensitive customer data, manipulate vendor information, or deface marketplace pages, damaging brand reputation and customer trust. The multi-vendor nature of Dokan Pro means that a compromised vendor account could be leveraged to attack other vendors or site administrators, potentially escalating privileges or causing widespread disruption. Confidentiality is impacted through data theft, integrity through unauthorized content or transaction manipulation, and availability through potential denial-of-service conditions caused by malicious scripts. Given the widespread use of WordPress and Dokan Pro in European online retail, the threat could affect a broad range of SMEs and large enterprises. Regulatory frameworks like GDPR increase the stakes, as data breaches resulting from such vulnerabilities could lead to significant fines and legal consequences.

Mitigation Recommendations

Organizations should immediately audit their Dokan Pro installations and restrict vendor privileges to the minimum necessary to reduce the risk of malicious input. Until patches are available, implement strict input validation and output encoding on all user-generated content fields, especially those rendered in administrative or vendor dashboards. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor logs and user activity for suspicious behavior indicative of XSS exploitation attempts. Educate vendors and administrators about the risks of clicking unknown links or opening untrusted content within the platform. Once the vendor releases a patch, prioritize prompt application of updates. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting Dokan Pro. Regularly back up site data to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:58.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bec94b7d62031395509b5

Added to database: 1/5/2026, 4:53:40 PM

Last enriched: 1/20/2026, 7:48:53 PM

Last updated: 2/7/2026, 5:05:27 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats