CVE-2025-58985: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPFactory Additional Custom Product Tabs for WooCommerce
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Additional Custom Product Tabs for WooCommerce allows Stored XSS. This issue affects Additional Custom Product Tabs for WooCommerce: from n/a through 1.7.3.
AI Analysis
Technical Summary
CVE-2025-58985 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'Additional Custom Product Tabs for WooCommerce' developed by WPFactory. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's custom product tabs feature. When a victim visits a product page containing the malicious payload, the injected script executes in the context of the victim's browser. The vulnerability affects versions up to and including 1.7.3, with no specific earliest affected version identified. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) reveals that the attack can be performed remotely over the network with low attack complexity, requires the attacker to have some privileges (likely contributor or shop manager roles) and requires user interaction (the victim must visit the infected page). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability loss, as the attacker can execute scripts that may steal session cookies, perform actions on behalf of the user, or deface content. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for WooCommerce stores using this plugin to add custom product tabs, which is a common feature for enhanced product descriptions or additional information. The stored nature of the XSS makes it more dangerous than reflected XSS, as the payload persists and affects multiple users.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability poses a significant risk to customer trust and data security. Exploitation could lead to session hijacking, unauthorized actions on user accounts, theft of sensitive customer data, and potential defacement of product pages. This can result in reputational damage, loss of sales, and regulatory consequences under GDPR if personal data is compromised. The medium severity score reflects that while the vulnerability requires some privileges and user interaction, the widespread use of WooCommerce and the plugin in Europe means many organizations could be exposed. Attackers could target store administrators or contributors to inject malicious scripts, which then affect end customers and other site users. The cross-site scripting can also be leveraged as a stepping stone for more complex attacks, including phishing or malware distribution. Given the e-commerce context, financial fraud and disruption of business operations are plausible outcomes.
Mitigation Recommendations
1. Immediate action should be to update the 'Additional Custom Product Tabs for WooCommerce' plugin to a patched version once available. Monitor WPFactory and official plugin repositories for updates. 2. In the interim, restrict plugin usage to trusted administrators and contributors only, minimizing the number of users who can add or edit product tabs. 3. Implement strict input validation and output encoding on all user-supplied data in product tabs, ideally using WordPress's built-in escaping functions such as esc_html(), esc_attr(), and wp_kses() to sanitize inputs. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on product pages. 5. Conduct regular security audits and penetration testing focusing on plugin components that handle user input. 6. Educate site administrators about the risks of XSS and the importance of cautious input handling. 7. Monitor web server logs and user reports for suspicious activity indicative of exploitation attempts. 8. Consider temporarily disabling the plugin if immediate patching is not feasible and the risk is deemed high.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-58985: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPFactory Additional Custom Product Tabs for WooCommerce
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Additional Custom Product Tabs for WooCommerce allows Stored XSS. This issue affects Additional Custom Product Tabs for WooCommerce: from n/a through 1.7.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-58985 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'Additional Custom Product Tabs for WooCommerce' developed by WPFactory. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's custom product tabs feature. When a victim visits a product page containing the malicious payload, the injected script executes in the context of the victim's browser. The vulnerability affects versions up to and including 1.7.3, with no specific earliest affected version identified. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) reveals that the attack can be performed remotely over the network with low attack complexity, requires the attacker to have some privileges (likely contributor or shop manager roles) and requires user interaction (the victim must visit the infected page). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability loss, as the attacker can execute scripts that may steal session cookies, perform actions on behalf of the user, or deface content. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for WooCommerce stores using this plugin to add custom product tabs, which is a common feature for enhanced product descriptions or additional information. The stored nature of the XSS makes it more dangerous than reflected XSS, as the payload persists and affects multiple users.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability poses a significant risk to customer trust and data security. Exploitation could lead to session hijacking, unauthorized actions on user accounts, theft of sensitive customer data, and potential defacement of product pages. This can result in reputational damage, loss of sales, and regulatory consequences under GDPR if personal data is compromised. The medium severity score reflects that while the vulnerability requires some privileges and user interaction, the widespread use of WooCommerce and the plugin in Europe means many organizations could be exposed. Attackers could target store administrators or contributors to inject malicious scripts, which then affect end customers and other site users. The cross-site scripting can also be leveraged as a stepping stone for more complex attacks, including phishing or malware distribution. Given the e-commerce context, financial fraud and disruption of business operations are plausible outcomes.
Mitigation Recommendations
1. Immediate action should be to update the 'Additional Custom Product Tabs for WooCommerce' plugin to a patched version once available. Monitor WPFactory and official plugin repositories for updates. 2. In the interim, restrict plugin usage to trusted administrators and contributors only, minimizing the number of users who can add or edit product tabs. 3. Implement strict input validation and output encoding on all user-supplied data in product tabs, ideally using WordPress's built-in escaping functions such as esc_html(), esc_attr(), and wp_kses() to sanitize inputs. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on product pages. 5. Conduct regular security audits and penetration testing focusing on plugin components that handle user input. 6. Educate site administrators about the risks of XSS and the importance of cautious input handling. 7. Monitor web server logs and user reports for suspicious activity indicative of exploitation attempts. 8. Consider temporarily disabling the plugin if immediate patching is not feasible and the risk is deemed high.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-06T04:45:22.563Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c05927ffcb452a184a8c41
Added to database: 9/9/2025, 4:43:19 PM
Last enriched: 9/9/2025, 4:45:47 PM
Last updated: 9/9/2025, 4:45:47 PM
Views: 2
Related Threats
CVE-2025-54915: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Windows 10 Version 1809
MediumCVE-2025-54912: CWE-416: Use After Free in Microsoft Windows 10 Version 1809
HighCVE-2025-54911: CWE-416: Use After Free in Microsoft Windows 10 Version 1809
HighCVE-2025-54910: CWE-122: Heap-based Buffer Overflow in Microsoft Microsoft Office 2019
HighCVE-2025-54901: CWE-126: Buffer Over-read in Microsoft Microsoft Office 2019
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.