Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69088: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Vidish Combo Offers WooCommerce

0
Medium
VulnerabilityCVE-2025-69088cvecve-2025-69088
Published: Tue Dec 30 2025 (12/30/2025, 10:47:57 UTC)
Source: CVE Database V5
Vendor/Project: Vidish
Product: Combo Offers WooCommerce

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vidish Combo Offers WooCommerce woo-combo-offers allows DOM-Based XSS.This issue affects Combo Offers WooCommerce: from n/a through <= 4.2.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:58:43 UTC

Technical Analysis

CVE-2025-69088 identifies a DOM-based Cross-site Scripting (XSS) vulnerability in the Vidish Combo Offers WooCommerce plugin, specifically in versions up to 4.2. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed in the context of the victim's browser. This type of XSS is executed on the client side (DOM-based), meaning the malicious payload is triggered by manipulating the Document Object Model after the page loads, often via crafted URLs or input fields. The vulnerability requires an attacker to have at least low privileges (PR:L) and user interaction (UI:R), such as convincing a user to click a malicious link. The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial confidentiality, integrity, and availability impacts (C:L/I:L/A:L), and scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, but the medium severity score (6.5) reflects a significant risk if exploited. The plugin is widely used in WooCommerce-based e-commerce sites to manage combo offers, making it a valuable target for attackers aiming to steal session tokens, perform actions on behalf of users, or deface websites. The vulnerability was published on December 30, 2025, and no official patches or fixes are currently linked, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Vidish Combo Offers plugin, this vulnerability poses a risk of client-side code execution leading to theft of sensitive customer data such as session cookies, personal information, or payment details. It can also enable attackers to perform unauthorized actions on behalf of users, potentially leading to fraudulent transactions or reputational damage. The partial impact on availability could result in service disruption or defacement, affecting customer trust and business continuity. Given the widespread adoption of WooCommerce in Europe, particularly in countries with mature e-commerce markets, the threat could affect a large number of small to medium-sized enterprises. Additionally, the scope change in the CVSS vector suggests that exploitation could impact other components or systems connected to the vulnerable plugin, increasing the potential damage. Although exploitation requires user interaction and some privileges, phishing or social engineering campaigns could facilitate attacks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

Organizations should monitor for official patches or updates from Vidish and apply them promptly once available. In the absence of patches, administrators should implement strict input validation and output encoding on all user-supplied data within the plugin's context to prevent script injection. Employing a robust Content Security Policy (CSP) can help mitigate the impact by restricting the execution of unauthorized scripts. Regular security audits and code reviews of customizations involving the plugin are recommended to identify and remediate unsafe input handling. User education to recognize phishing attempts can reduce the risk of user interaction-based exploitation. Additionally, deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Organizations should also consider isolating or limiting plugin privileges and monitoring logs for suspicious activities indicative of exploitation attempts. Backup strategies should be in place to recover quickly from potential defacement or availability impacts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-29T11:19:16.970Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450b1db813ff03e2bedea

Added to database: 12/30/2025, 10:22:41 PM

Last enriched: 1/21/2026, 1:58:43 AM

Last updated: 2/6/2026, 1:46:12 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats