CVE-2025-9367: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in uscnanbu Welcart e-Commerce
The Welcart e-Commerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 2.11.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-9367 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Welcart e-Commerce plugin for WordPress, affecting all versions up to and including 2.11.20. The vulnerability stems from insufficient input sanitization and output escaping of settings data within the plugin, which allows authenticated users with editor-level permissions or higher to inject arbitrary JavaScript code into pages. These scripts are stored persistently and executed whenever any user accesses the affected pages, leading to potential compromise of user sessions, theft of sensitive information, or unauthorized actions performed on behalf of users. The vulnerability specifically affects multi-site WordPress installations or single-site installations where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk in those environments. The attack vector requires network access and authenticated privileges at the editor level or above, but no user interaction is needed once the malicious script is injected. The CVSS 3.1 base score of 5.5 reflects a medium severity, with low confidentiality and integrity impacts and no availability impact. No public exploits have been reported yet, but the vulnerability's nature makes it a potential target for attackers seeking to leverage trusted site contexts for malicious purposes. The vulnerability was reserved in August 2025 and published in September 2025, with no official patches linked yet, indicating that users should monitor vendor updates closely.
Potential Impact
The primary impact of CVE-2025-9367 is the potential for attackers with editor-level access to inject persistent malicious scripts into web pages served by the Welcart e-Commerce plugin. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Since the vulnerability affects multi-site WordPress installations and those with unfiltered_html disabled, organizations running such configurations are at risk of having multiple sites compromised through a single injection point. The impact on confidentiality and integrity is moderate, as attackers can steal sensitive user data or manipulate content, but there is no direct impact on availability. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments where editor-level accounts may be compromised or insufficiently controlled. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Overall, organizations using Welcart e-Commerce in multi-site setups face a tangible risk of reputational damage, data breaches, and potential regulatory consequences if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-9367, organizations should: 1) Immediately audit user roles and permissions to ensure that only trusted users have editor-level or higher access, minimizing the risk of malicious script injection. 2) Monitor and restrict multi-site WordPress installations where possible, or apply strict content filtering and input validation on plugin settings. 3) Enable and enforce the use of security plugins that provide additional XSS protection and content sanitization layers. 4) Regularly update the Welcart e-Commerce plugin as soon as the vendor releases a patch addressing this vulnerability. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Conduct thorough code reviews and penetration testing focused on input sanitization and output escaping in custom plugins and themes. 7) Educate administrators and editors about the risks of injecting untrusted content and the importance of secure content management practices. 8) Consider disabling or limiting the use of unfiltered_html capability where feasible to reduce attack vectors. These measures collectively reduce the likelihood of exploitation and limit the impact if an injection occurs.
Affected Countries
United States, Japan, Germany, United Kingdom, France, Australia, Canada, India, Brazil, South Korea
CVE-2025-9367: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in uscnanbu Welcart e-Commerce
Description
The Welcart e-Commerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 2.11.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9367 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Welcart e-Commerce plugin for WordPress, affecting all versions up to and including 2.11.20. The vulnerability stems from insufficient input sanitization and output escaping of settings data within the plugin, which allows authenticated users with editor-level permissions or higher to inject arbitrary JavaScript code into pages. These scripts are stored persistently and executed whenever any user accesses the affected pages, leading to potential compromise of user sessions, theft of sensitive information, or unauthorized actions performed on behalf of users. The vulnerability specifically affects multi-site WordPress installations or single-site installations where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk in those environments. The attack vector requires network access and authenticated privileges at the editor level or above, but no user interaction is needed once the malicious script is injected. The CVSS 3.1 base score of 5.5 reflects a medium severity, with low confidentiality and integrity impacts and no availability impact. No public exploits have been reported yet, but the vulnerability's nature makes it a potential target for attackers seeking to leverage trusted site contexts for malicious purposes. The vulnerability was reserved in August 2025 and published in September 2025, with no official patches linked yet, indicating that users should monitor vendor updates closely.
Potential Impact
The primary impact of CVE-2025-9367 is the potential for attackers with editor-level access to inject persistent malicious scripts into web pages served by the Welcart e-Commerce plugin. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Since the vulnerability affects multi-site WordPress installations and those with unfiltered_html disabled, organizations running such configurations are at risk of having multiple sites compromised through a single injection point. The impact on confidentiality and integrity is moderate, as attackers can steal sensitive user data or manipulate content, but there is no direct impact on availability. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments where editor-level accounts may be compromised or insufficiently controlled. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Overall, organizations using Welcart e-Commerce in multi-site setups face a tangible risk of reputational damage, data breaches, and potential regulatory consequences if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-9367, organizations should: 1) Immediately audit user roles and permissions to ensure that only trusted users have editor-level or higher access, minimizing the risk of malicious script injection. 2) Monitor and restrict multi-site WordPress installations where possible, or apply strict content filtering and input validation on plugin settings. 3) Enable and enforce the use of security plugins that provide additional XSS protection and content sanitization layers. 4) Regularly update the Welcart e-Commerce plugin as soon as the vendor releases a patch addressing this vulnerability. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Conduct thorough code reviews and penetration testing focused on input sanitization and output escaping in custom plugins and themes. 7) Educate administrators and editors about the risks of injecting untrusted content and the importance of secure content management practices. 8) Consider disabling or limiting the use of unfiltered_html capability where feasible to reduce attack vectors. These measures collectively reduce the likelihood of exploitation and limit the impact if an injection occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-22T18:29:12.600Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c11e7ee55cc6e90d9f3b81
Added to database: 9/10/2025, 6:45:18 AM
Last enriched: 2/26/2026, 5:54:15 PM
Last updated: 3/26/2026, 8:19:28 AM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.