Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62748: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Genetech Products Web and WooCommerce Addons for WPBakery Builder

0
Medium
VulnerabilityCVE-2025-62748cvecve-2025-62748cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 12:02:49 UTC)
Source: CVE Database V5
Vendor/Project: Genetech Products
Product: Web and WooCommerce Addons for WPBakery Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Genetech Products Web and WooCommerce Addons for WPBakery Builder allows DOM-Based XSS.This issue affects Web and WooCommerce Addons for WPBakery Builder: from n/a through 1.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:37:38 UTC

Technical Analysis

CVE-2025-62748 identifies a DOM-based Cross-site Scripting (XSS) vulnerability classified under CWE-79 in Genetech Products' Web and WooCommerce Addons for WPBakery Builder, affecting versions up to 1.5. The vulnerability stems from improper neutralization of user-supplied input during dynamic web page generation, which allows malicious scripts to be injected and executed in the victim's browser context. This type of XSS is client-side and occurs when the web application uses unsafe JavaScript methods to process input without adequate sanitization. The attack requires an attacker to have low privileges (PR:L) and user interaction (UI:R), such as convincing a user to click a crafted link or visit a malicious page. The vulnerability has a CVSS v3.1 score of 6.5, reflecting medium severity with network attack vector (AV:N), low attack complexity (AC:L), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes partial confidentiality loss (C:L), integrity loss (I:L), and availability loss (A:L), meaning attackers can steal sensitive information, manipulate data, or disrupt service. No known exploits have been reported in the wild, and no official patches have been released yet. The vulnerability affects WordPress sites using these addons, particularly those running WooCommerce for e-commerce functionality, which are common targets for attackers due to the sensitive customer and transaction data involved. The issue was reserved in October 2025 and published at the end of December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those operating e-commerce platforms using WooCommerce and WPBakery Builder addons by Genetech Products. Exploitation could lead to theft of customer data, including personal and payment information, session hijacking, and unauthorized actions performed on behalf of legitimate users. This can result in financial losses, reputational damage, regulatory penalties under GDPR, and disruption of business operations. The medium severity rating suggests that while exploitation requires some user interaction and low privileges, the consequences can still be impactful, particularly in sectors like retail, finance, and services that rely heavily on WordPress-based e-commerce solutions. The lack of currently known exploits provides a window for proactive mitigation, but organizations should act swiftly to prevent targeted attacks. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the immediate plugin, potentially impacting integrated systems or other plugins.

Mitigation Recommendations

1. Monitor Genetech Products' official channels for patches addressing CVE-2025-62748 and apply them promptly once available. 2. Implement strict input validation and sanitization on all user-supplied data, especially in custom code interacting with the affected addons. 3. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Use security plugins or Web Application Firewalls (WAF) that can detect and block malicious payloads targeting known XSS vectors. 5. Educate users and administrators about phishing and social engineering tactics to reduce the likelihood of successful user interaction exploitation. 6. Conduct regular security audits and penetration testing focusing on client-side vulnerabilities in WordPress environments. 7. Limit plugin usage to only necessary components and remove outdated or unused addons to reduce the attack surface. 8. Monitor logs and user activity for unusual behavior that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-21T14:59:50.024Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69554136db813ff03eefd38f

Added to database: 12/31/2025, 3:28:54 PM

Last enriched: 1/20/2026, 10:37:38 PM

Last updated: 2/6/2026, 3:47:41 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats