Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Filipe Seabra WooCommerce Parcelas

0
Medium
VulnerabilityCVE-2025-62750cvecve-2025-62750cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 13:32:33 UTC)
Source: CVE Database V5
Vendor/Project: Filipe Seabra
Product: WooCommerce Parcelas

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Filipe Seabra WooCommerce Parcelas allows DOM-Based XSS.This issue affects WooCommerce Parcelas: from n/a through 1.3.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:38:02 UTC

Technical Analysis

CVE-2025-62750 identifies a DOM-based Cross-site Scripting (XSS) vulnerability in the WooCommerce Parcelas plugin, a tool used to manage installment payments in WooCommerce-based e-commerce websites. This vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode user-supplied data before inserting it into the DOM, allowing attackers to execute arbitrary JavaScript code within the context of the victim’s browser. The vulnerability affects all versions up to 1.3.5. Exploitation requires the attacker to have high privileges (PR:H) on the system and involves user interaction (UI:R), such as tricking a user into clicking a crafted link or interacting with malicious content. The attack vector is network-based (AV:N), meaning it can be exploited remotely. The vulnerability impacts confidentiality, integrity, and availability (C:L/I:L/A:L) of the affected web application, potentially allowing theft of session tokens, manipulation of displayed content, or disruption of service. No public exploits are known at this time, and no official patches have been released yet. The vulnerability’s scope is considered changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The plugin is widely used in WooCommerce environments, which are popular in European e-commerce markets.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce and the WooCommerce Parcelas plugin, this vulnerability poses a risk of client-side code execution leading to session hijacking, data theft, or fraudulent transactions. The compromise of user sessions can damage customer trust and lead to regulatory non-compliance under GDPR due to potential exposure of personal data. The integrity of transaction data may be undermined, affecting financial reporting and customer billing. Availability impacts could arise if attackers disrupt the normal functioning of the payment installment feature, leading to loss of sales and reputational damage. Given the medium severity and the requirement for authenticated access, the threat is more significant for organizations with multiple privileged users or where privilege escalation is possible. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the WooCommerce Parcelas plugin developer as soon as they become available. 2. Restrict plugin administrative access strictly to trusted personnel and enforce strong authentication mechanisms to reduce the risk of privilege abuse. 3. Implement robust input validation and output encoding on all user inputs, especially those processed by the plugin, to prevent injection of malicious scripts. 4. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. 5. Conduct regular security audits and penetration testing focused on web application vulnerabilities including DOM-based XSS. 6. Educate users and administrators about phishing and social engineering tactics that could facilitate exploitation requiring user interaction. 7. Consider disabling or replacing the plugin if immediate patching is not feasible and the risk is unacceptable. 8. Monitor web server and application logs for suspicious activities indicative of attempted XSS exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-21T14:59:50.025Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955289adb813ff03eeaf24e

Added to database: 12/31/2025, 1:43:54 PM

Last enriched: 1/20/2026, 10:38:02 PM

Last updated: 2/7/2026, 1:54:00 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats