CVE-2025-62750
Lifecycle Timeline
2Tags
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Filipe Seabra WooCommerce Parcelas woocommerce-parcelas allows DOM-Based XSS.This issue affects WooCommerce Parcelas: from n/a through <= 1.3.5.
Analysis
DOM-based cross-site scripting (XSS) in WooCommerce Parcelas WordPress plugin versions up to 1.3.5 allows attackers to inject malicious scripts into web pages viewed by users. The vulnerability stems from improper neutralization of user input during page generation, enabling attackers to execute arbitrary JavaScript in victims' browsers without authentication. While EPSS scoring indicates low exploitation probability (0.01%), the DOM-based nature and lack of authentication barriers make this a persistent client-side threat in environments where the vulnerable plugin remains deployed.
Technical Context
This vulnerability is a DOM-based cross-site scripting flaw (CWE-79), a category distinct from reflected or stored XSS that occurs when client-side JavaScript processes untrusted data without proper sanitization. The WooCommerce Parcelas plugin, a WordPress extension for installment payment management, fails to neutralize user-controlled input before inserting it into the Document Object Model. The attack vector operates at the browser level, where attacker-controlled values (likely from URL parameters, form fields, or query strings) are directly rendered as executable code rather than escaped HTML entities. WordPress plugins are particularly susceptible to XSS due to widespread deployment and reliance on third-party input handling libraries; Patchstack's discovery via automated audit suggests systematic scanning of plugin code for dangerous functions like innerHTML, eval(), or unescaped data binding.
Affected Products
WooCommerce Parcelas plugin by Filipe Seabra, versions 1.3.5 and all earlier releases, is affected. This is a WordPress plugin distributed via the official WordPress.org plugin repository. The vulnerability impacts all WordPress installations running WooCommerce Parcelas up to and including version 1.3.5. Users can verify their installed version via the WordPress admin dashboard under Plugins > Installed Plugins or by checking the readme.txt file in the plugin directory.
Remediation
Update WooCommerce Parcelas to version 1.3.6 or later, which addresses the DOM-based XSS vulnerability through proper input neutralization and output encoding. Administrators should navigate to WordPress Dashboard > Plugins > Updates and apply the patch immediately if available, or manually download the latest version from the WordPress.org plugin repository at https://wordpress.org/plugins/woocommerce-parcelas/. If an immediate patch is unavailable from the vendor, consider temporarily disabling the plugin until a fix is released. Refer to the Patchstack vulnerability report at https://patchstack.com/database/Wordpress/Plugin/woocommerce-parcelas/vulnerability/wordpress-woocommerce-parcelas-plugin-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve for technical details and follow-up updates from the maintainer.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today