CVE-2025-8617: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH WooCommerce Quick View
The YITH WooCommerce Quick View plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's yith_quick_view shortcode in all versions up to, and including, 2.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8617 is a stored cross-site scripting vulnerability classified under CWE-79, found in the YITH WooCommerce Quick View plugin for WordPress. This plugin, widely used to enhance WooCommerce product browsing, suffers from improper neutralization of user-supplied input within the yith_quick_view shortcode. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level access or higher. As a result, these users can inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who visits the affected page. The vulnerability affects all versions up to and including 2.7.0. The CVSS 3.1 base score is 6.4 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating network exploitability, low attack complexity, requiring privileges but no user interaction, and partial impact on confidentiality and integrity with no availability impact. The scope is changed because the vulnerability affects resources beyond the attacker’s privileges, potentially impacting all users viewing the injected content. No public exploits have been reported yet. The vulnerability can be leveraged to steal session cookies, perform actions on behalf of users, deface content, or deliver malware, posing risks to website integrity and user trust. The lack of patch links suggests a fix may be pending or not yet publicly available, emphasizing the need for interim mitigations.
Potential Impact
The impact of CVE-2025-8617 is significant for organizations running WordPress sites with WooCommerce and the vulnerable YITH WooCommerce Quick View plugin. Successful exploitation allows authenticated contributors or higher to inject persistent malicious scripts, which execute in the browsers of site visitors and administrators. This can lead to session hijacking, unauthorized actions, data theft, defacement, or distribution of malware. The compromise of administrative accounts or customer data can damage organizational reputation, result in financial loss, and trigger regulatory penalties, especially in e-commerce environments. Since WooCommerce powers many online stores globally, the potential scope is broad. The vulnerability’s requirement for contributor-level access limits exploitation to insiders or compromised accounts, but such access is common in collaborative content management environments. The absence of user interaction lowers the barrier for exploitation once the attacker has access. The medium CVSS score reflects moderate risk, but the real-world impact depends on the attacker’s intent and the site’s security posture. Organizations failing to address this vulnerability risk persistent site compromise and erosion of customer trust.
Mitigation Recommendations
To mitigate CVE-2025-8617, organizations should first verify if they use the YITH WooCommerce Quick View plugin and identify the version in use. Since no official patch links are currently available, immediate steps include restricting contributor-level access to trusted users only and auditing existing contributor accounts for suspicious activity. Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the yith_quick_view shortcode parameters. Employ input validation and output encoding at the application level if possible, or use security plugins that enforce stricter sanitization. Monitor logs for unusual script injections or changes in page content. Educate content contributors about safe input practices and the risks of injecting scripts. Once a vendor patch is released, prioritize prompt updating of the plugin. Additionally, consider isolating or disabling the shortcode functionality if it is not essential. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, implement Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-8617: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH WooCommerce Quick View
Description
The YITH WooCommerce Quick View plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's yith_quick_view shortcode in all versions up to, and including, 2.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-8617 is a stored cross-site scripting vulnerability classified under CWE-79, found in the YITH WooCommerce Quick View plugin for WordPress. This plugin, widely used to enhance WooCommerce product browsing, suffers from improper neutralization of user-supplied input within the yith_quick_view shortcode. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level access or higher. As a result, these users can inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who visits the affected page. The vulnerability affects all versions up to and including 2.7.0. The CVSS 3.1 base score is 6.4 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating network exploitability, low attack complexity, requiring privileges but no user interaction, and partial impact on confidentiality and integrity with no availability impact. The scope is changed because the vulnerability affects resources beyond the attacker’s privileges, potentially impacting all users viewing the injected content. No public exploits have been reported yet. The vulnerability can be leveraged to steal session cookies, perform actions on behalf of users, deface content, or deliver malware, posing risks to website integrity and user trust. The lack of patch links suggests a fix may be pending or not yet publicly available, emphasizing the need for interim mitigations.
Potential Impact
The impact of CVE-2025-8617 is significant for organizations running WordPress sites with WooCommerce and the vulnerable YITH WooCommerce Quick View plugin. Successful exploitation allows authenticated contributors or higher to inject persistent malicious scripts, which execute in the browsers of site visitors and administrators. This can lead to session hijacking, unauthorized actions, data theft, defacement, or distribution of malware. The compromise of administrative accounts or customer data can damage organizational reputation, result in financial loss, and trigger regulatory penalties, especially in e-commerce environments. Since WooCommerce powers many online stores globally, the potential scope is broad. The vulnerability’s requirement for contributor-level access limits exploitation to insiders or compromised accounts, but such access is common in collaborative content management environments. The absence of user interaction lowers the barrier for exploitation once the attacker has access. The medium CVSS score reflects moderate risk, but the real-world impact depends on the attacker’s intent and the site’s security posture. Organizations failing to address this vulnerability risk persistent site compromise and erosion of customer trust.
Mitigation Recommendations
To mitigate CVE-2025-8617, organizations should first verify if they use the YITH WooCommerce Quick View plugin and identify the version in use. Since no official patch links are currently available, immediate steps include restricting contributor-level access to trusted users only and auditing existing contributor accounts for suspicious activity. Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the yith_quick_view shortcode parameters. Employ input validation and output encoding at the application level if possible, or use security plugins that enforce stricter sanitization. Monitor logs for unusual script injections or changes in page content. Educate content contributors about safe input practices and the risks of injecting scripts. Once a vendor patch is released, prioritize prompt updating of the plugin. Additionally, consider isolating or disabling the shortcode functionality if it is not essential. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, implement Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-05T20:10:29.300Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef67d977419e584a5273
Added to database: 12/13/2025, 4:45:27 AM
Last enriched: 2/26/2026, 5:19:52 PM
Last updated: 3/24/2026, 3:10:48 PM
Views: 130
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.