CVE-2025-47662: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in woobox Woobox
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in woobox Woobox allows Stored XSS. This issue affects Woobox: from n/a through 1.6.
AI Analysis
Technical Summary
CVE-2025-47662 is a Stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the Woobox platform up to version 1.6. Woobox is a marketing and engagement platform that allows users to create interactive campaigns such as contests, polls, and promotions. The vulnerability arises due to improper neutralization of input during web page generation, meaning that user-supplied data is not correctly sanitized or encoded before being rendered in the web interface. This flaw enables an attacker to inject malicious scripts that are stored on the server and executed in the browsers of users who view the affected pages. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component. Exploitation requires an attacker with some level of privileges on the platform and user interaction to trigger the malicious script. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites, potentially compromising user accounts and data integrity within the Woobox environment. Given Woobox’s role in managing marketing campaigns, exploitation could also lead to reputational damage and loss of customer trust.
Potential Impact
For European organizations using Woobox, this vulnerability could lead to unauthorized script execution within the context of their marketing campaigns or user interactions. This may result in theft of session tokens, unauthorized actions performed on behalf of users, or delivery of malicious payloads to end users. The impact extends to potential data leakage, manipulation of campaign content, and disruption of marketing activities. Organizations relying on Woobox for customer engagement risk reputational harm and regulatory scrutiny under GDPR if personal data is compromised. The requirement for attacker privileges and user interaction somewhat limits the ease of exploitation; however, insider threats or compromised accounts could be leveraged to exploit this vulnerability. The scope change in the CVSS vector suggests that the vulnerability could affect multiple components or users beyond the initially compromised area, increasing the potential breadth of impact within an organization.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Woobox to a patched version once available, as no patch links are currently provided. In the interim, organizations should implement strict input validation and output encoding on all user-supplied data within Woobox, particularly in campaign creation and management interfaces. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS payloads. Regularly audit user privileges and enforce the principle of least privilege to minimize the risk of attackers gaining the necessary access to exploit this vulnerability. Additionally, monitor logs for unusual activity indicative of XSS exploitation attempts and educate users about the risks of interacting with suspicious campaign content. If feasible, isolate Woobox instances from critical internal networks to limit lateral movement in case of compromise.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain
CVE-2025-47662: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in woobox Woobox
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in woobox Woobox allows Stored XSS. This issue affects Woobox: from n/a through 1.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-47662 is a Stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the Woobox platform up to version 1.6. Woobox is a marketing and engagement platform that allows users to create interactive campaigns such as contests, polls, and promotions. The vulnerability arises due to improper neutralization of input during web page generation, meaning that user-supplied data is not correctly sanitized or encoded before being rendered in the web interface. This flaw enables an attacker to inject malicious scripts that are stored on the server and executed in the browsers of users who view the affected pages. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component. Exploitation requires an attacker with some level of privileges on the platform and user interaction to trigger the malicious script. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites, potentially compromising user accounts and data integrity within the Woobox environment. Given Woobox’s role in managing marketing campaigns, exploitation could also lead to reputational damage and loss of customer trust.
Potential Impact
For European organizations using Woobox, this vulnerability could lead to unauthorized script execution within the context of their marketing campaigns or user interactions. This may result in theft of session tokens, unauthorized actions performed on behalf of users, or delivery of malicious payloads to end users. The impact extends to potential data leakage, manipulation of campaign content, and disruption of marketing activities. Organizations relying on Woobox for customer engagement risk reputational harm and regulatory scrutiny under GDPR if personal data is compromised. The requirement for attacker privileges and user interaction somewhat limits the ease of exploitation; however, insider threats or compromised accounts could be leveraged to exploit this vulnerability. The scope change in the CVSS vector suggests that the vulnerability could affect multiple components or users beyond the initially compromised area, increasing the potential breadth of impact within an organization.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Woobox to a patched version once available, as no patch links are currently provided. In the interim, organizations should implement strict input validation and output encoding on all user-supplied data within Woobox, particularly in campaign creation and management interfaces. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS payloads. Regularly audit user privileges and enforce the principle of least privilege to minimize the risk of attackers gaining the necessary access to exploit this vulnerability. Additionally, monitor logs for unusual activity indicative of XSS exploitation attempts and educate users about the risks of interacting with suspicious campaign content. If feasible, isolate Woobox instances from critical internal networks to limit lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:20.229Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd932f
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 11:55:22 AM
Last updated: 1/7/2026, 4:24:23 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.