CVE-2025-64380: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Pluggabl Booster for WooCommerce
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluggabl Booster for WooCommerce woocommerce-jetpack allows Stored XSS.This issue affects Booster for WooCommerce: from n/a through <= 7.3.2.
AI Analysis
Technical Summary
CVE-2025-64380 is a stored Cross-site Scripting (XSS) vulnerability identified in the Pluggabl Booster for WooCommerce plugin, specifically versions up to and including 7.3.2. The vulnerability is caused by improper neutralization of input during the generation of web pages, which allows malicious input to be stored and later executed in the context of a victim's browser. This type of vulnerability enables attackers to execute arbitrary JavaScript code, potentially leading to session hijacking, defacement, or redirection to malicious sites. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level. No public exploits are currently known, but the vulnerability is published and should be considered a credible risk. Booster for WooCommerce is a popular plugin that extends WooCommerce functionality, widely used in WordPress e-commerce sites. Stored XSS vulnerabilities are particularly dangerous in e-commerce contexts as they can be used to steal customer data, manipulate transactions, or inject fraudulent content. The vulnerability requires an attacker to have some level of authenticated access and to trick a user into interacting with the malicious payload, which may limit exploitation but does not eliminate risk.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Booster plugin, this vulnerability poses a risk of customer data theft, session hijacking, and potential reputational damage. Attackers exploiting this stored XSS could inject malicious scripts that execute in the browsers of site administrators or customers, leading to unauthorized actions or data leakage. This can undermine customer trust and lead to regulatory compliance issues under GDPR if personal data is compromised. The medium severity rating reflects that while exploitation requires some privileges and user interaction, the potential impact on confidentiality, integrity, and availability is non-trivial. Given the widespread use of WooCommerce in Europe, particularly in countries with strong e-commerce sectors, the threat could affect a significant number of businesses, from small retailers to larger enterprises. Additionally, the change in scope indicates that the vulnerability could impact other components or services integrated with the plugin, amplifying the risk.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the Booster for WooCommerce plugin is in use and confirm the version. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict plugin access to trusted administrators only, minimizing the number of users with privileges to inject content. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns associated with XSS payloads targeting this plugin. 3) Enforce Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4) Conduct thorough input validation and output encoding on all user-generated content within the WooCommerce environment, especially where the plugin processes input. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within the e-commerce platform. 6) Monitor logs for unusual activity that may indicate exploitation attempts. 7) Plan for rapid deployment of vendor patches once available and test updates in a staging environment before production rollout. These steps go beyond generic advice by focusing on access control, proactive detection, and layered defenses specific to the plugin's context.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-64380: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Pluggabl Booster for WooCommerce
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluggabl Booster for WooCommerce woocommerce-jetpack allows Stored XSS.This issue affects Booster for WooCommerce: from n/a through <= 7.3.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-64380 is a stored Cross-site Scripting (XSS) vulnerability identified in the Pluggabl Booster for WooCommerce plugin, specifically versions up to and including 7.3.2. The vulnerability is caused by improper neutralization of input during the generation of web pages, which allows malicious input to be stored and later executed in the context of a victim's browser. This type of vulnerability enables attackers to execute arbitrary JavaScript code, potentially leading to session hijacking, defacement, or redirection to malicious sites. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level. No public exploits are currently known, but the vulnerability is published and should be considered a credible risk. Booster for WooCommerce is a popular plugin that extends WooCommerce functionality, widely used in WordPress e-commerce sites. Stored XSS vulnerabilities are particularly dangerous in e-commerce contexts as they can be used to steal customer data, manipulate transactions, or inject fraudulent content. The vulnerability requires an attacker to have some level of authenticated access and to trick a user into interacting with the malicious payload, which may limit exploitation but does not eliminate risk.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Booster plugin, this vulnerability poses a risk of customer data theft, session hijacking, and potential reputational damage. Attackers exploiting this stored XSS could inject malicious scripts that execute in the browsers of site administrators or customers, leading to unauthorized actions or data leakage. This can undermine customer trust and lead to regulatory compliance issues under GDPR if personal data is compromised. The medium severity rating reflects that while exploitation requires some privileges and user interaction, the potential impact on confidentiality, integrity, and availability is non-trivial. Given the widespread use of WooCommerce in Europe, particularly in countries with strong e-commerce sectors, the threat could affect a significant number of businesses, from small retailers to larger enterprises. Additionally, the change in scope indicates that the vulnerability could impact other components or services integrated with the plugin, amplifying the risk.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the Booster for WooCommerce plugin is in use and confirm the version. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict plugin access to trusted administrators only, minimizing the number of users with privileges to inject content. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns associated with XSS payloads targeting this plugin. 3) Enforce Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4) Conduct thorough input validation and output encoding on all user-generated content within the WooCommerce environment, especially where the plugin processes input. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within the e-commerce platform. 6) Monitor logs for unusual activity that may indicate exploitation attempts. 7) Plan for rapid deployment of vendor patches once available and test updates in a staging environment before production rollout. These steps go beyond generic advice by focusing on access control, proactive detection, and layered defenses specific to the plugin's context.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-31T11:25:32.710Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6915aa34dac9b42fc37a58ef
Added to database: 11/13/2025, 9:51:48 AM
Last enriched: 1/31/2026, 8:04:30 AM
Last updated: 2/6/2026, 2:03:40 AM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.