CVE-2025-48254: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPFactory Change Add to Cart Button Text for WooCommerce
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Change Add to Cart Button Text for WooCommerce allows Stored XSS. This issue affects Change Add to Cart Button Text for WooCommerce: from n/a through 2.2.2.
AI Analysis
Technical Summary
CVE-2025-48254 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'Change Add to Cart Button Text for WooCommerce' developed by WPFactory. This plugin allows customization of the 'Add to Cart' button text in WooCommerce stores. The vulnerability arises from improper neutralization of user-supplied input during web page generation, enabling an attacker to inject malicious scripts that are stored persistently and executed in the context of users visiting the affected site. The vulnerability affects all versions up to and including 2.2.2. Exploitation requires the attacker to have at least low privileges (PR:L) and some user interaction (UI:R), such as tricking an administrator or editor into performing an action that stores the malicious payload. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), partial privileges required, and scope changed (S:C), indicating that the vulnerability can impact resources beyond the initially vulnerable component. Successful exploitation can lead to partial confidentiality, integrity, and availability impacts, such as session hijacking, defacement, or unauthorized actions performed on behalf of users. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability's presence in a widely used e-commerce plugin makes it a significant concern for online retailers using WooCommerce with this plugin installed.
Potential Impact
For European organizations operating WooCommerce-based e-commerce websites using the 'Change Add to Cart Button Text for WooCommerce' plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise customer trust and data security. Attackers could execute malicious scripts in the browsers of site administrators or customers, potentially stealing session cookies, redirecting users to phishing sites, or manipulating site content. This can lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses from disrupted sales or fraud. Given the e-commerce sector's critical role in Europe's digital economy, especially in countries with high online retail penetration, the impact can be substantial. Additionally, the compromise of administrative accounts could lead to further site-wide control loss or malware injection, amplifying the damage. The medium severity score reflects that while exploitation requires some privileges and user interaction, the consequences affect confidentiality, integrity, and availability, making it a noteworthy threat for European WooCommerce operators.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the 'Change Add to Cart Button Text for WooCommerce' plugin is in use and determine the version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict input validation and output encoding on all user-supplied data related to this plugin's functionality, especially where button text customization is allowed. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit plugin access strictly to trusted users with minimal necessary privileges to reduce the risk of malicious input injection. Monitor logs for unusual activities or attempts to inject scripts. Educate administrators about phishing and social engineering risks that could facilitate exploitation. Once a patch becomes available, prioritize prompt application of updates. Additionally, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads specific to this plugin's context to provide interim protection.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48254: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPFactory Change Add to Cart Button Text for WooCommerce
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Change Add to Cart Button Text for WooCommerce allows Stored XSS. This issue affects Change Add to Cart Button Text for WooCommerce: from n/a through 2.2.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-48254 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'Change Add to Cart Button Text for WooCommerce' developed by WPFactory. This plugin allows customization of the 'Add to Cart' button text in WooCommerce stores. The vulnerability arises from improper neutralization of user-supplied input during web page generation, enabling an attacker to inject malicious scripts that are stored persistently and executed in the context of users visiting the affected site. The vulnerability affects all versions up to and including 2.2.2. Exploitation requires the attacker to have at least low privileges (PR:L) and some user interaction (UI:R), such as tricking an administrator or editor into performing an action that stores the malicious payload. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), partial privileges required, and scope changed (S:C), indicating that the vulnerability can impact resources beyond the initially vulnerable component. Successful exploitation can lead to partial confidentiality, integrity, and availability impacts, such as session hijacking, defacement, or unauthorized actions performed on behalf of users. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability's presence in a widely used e-commerce plugin makes it a significant concern for online retailers using WooCommerce with this plugin installed.
Potential Impact
For European organizations operating WooCommerce-based e-commerce websites using the 'Change Add to Cart Button Text for WooCommerce' plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise customer trust and data security. Attackers could execute malicious scripts in the browsers of site administrators or customers, potentially stealing session cookies, redirecting users to phishing sites, or manipulating site content. This can lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses from disrupted sales or fraud. Given the e-commerce sector's critical role in Europe's digital economy, especially in countries with high online retail penetration, the impact can be substantial. Additionally, the compromise of administrative accounts could lead to further site-wide control loss or malware injection, amplifying the damage. The medium severity score reflects that while exploitation requires some privileges and user interaction, the consequences affect confidentiality, integrity, and availability, making it a noteworthy threat for European WooCommerce operators.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the 'Change Add to Cart Button Text for WooCommerce' plugin is in use and determine the version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict input validation and output encoding on all user-supplied data related to this plugin's functionality, especially where button text customization is allowed. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit plugin access strictly to trusted users with minimal necessary privileges to reduce the risk of malicious input injection. Monitor logs for unusual activities or attempts to inject scripts. Educate administrators about phishing and social engineering risks that could facilitate exploitation. Once a patch becomes available, prioritize prompt application of updates. Additionally, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads specific to this plugin's context to provide interim protection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:09.841Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb639
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:18:41 PM
Last updated: 7/30/2025, 4:07:47 PM
Views: 12
Related Threats
CVE-2025-20048: Escalation of Privilege in Intel(R) Trace Analyzer and Collector software
MediumCVE-2025-20037: Escalation of Privilege in Intel(R) Converged Security and Management Engine
MediumCVE-2025-20025: Denial of Service in TinyCBOR libraries maintained by Intel(R)
MediumCVE-2025-20023: Escalation of Privilege in Intel(R) Graphics Driver software installers
MediumCVE-2025-20017: Escalation of Privilege in Intel(R) oneAPI Toolkit and component software installers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.