CVE-2025-62903
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Lifecycle Timeline
2Tags
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPClever WPC Smart Messages for WooCommerce wpc-smart-messages allows Stored XSS.This issue affects WPC Smart Messages for WooCommerce: from n/a through <= 4.2.8.
Analysis
Stored cross-site scripting (XSS) in WPClever WPC Smart Messages for WooCommerce plugin versions up to 4.2.8 allows authenticated users with limited privileges to inject malicious scripts that execute in the browsers of other site visitors. The vulnerability requires user interaction (UI:R) and affects confidentiality and integrity through script injection, with a CVSS score of 5.4 reflecting moderate risk; however, the 0.02% EPSS score indicates minimal real-world exploitation probability at time of analysis, and no public exploit code or active exploitation has been confirmed.
Technical Context
The vulnerability stems from improper input sanitization and output encoding in the WPC Smart Messages plugin for WooCommerce, a WordPress extension. CWE-79 (Improper Neutralization of Input During Web Page Generation) indicates that user-supplied input is not adequately neutralized before being rendered in the HTML context of web pages. The plugin likely fails to escape or sanitize message content at the point of storage or rendering, allowing authenticated users (typically with Author or Editor roles, given PR:L) to embed JavaScript payloads that persist in the database and execute when other users (including administrators) view or interact with the messages. The CVSS vector shows network-based attack vector (AV:N) with low attack complexity (AC:L), meaning no specialized tools or conditions are required beyond normal plugin functionality.
Affected Products
WPClever WPC Smart Messages for WooCommerce plugin versions from an unspecified initial version through and including version 4.2.8 are affected. The plugin is distributed via the WordPress.org plugin repository and is commonly installed on WooCommerce-based e-commerce sites. No CPE string was provided in the reference data, but the plugin can be identified via WordPress plugin slug 'wpc-smart-messages' and its presence in WordPress installations via the Patchstack vulnerability database link provided.
Remediation
Update WPC Smart Messages for WooCommerce to a version newer than 4.2.8 where input sanitization and output encoding have been corrected; check the plugin's changelog or the WPClever vendor site for the patched release version. Users should navigate to WordPress Dashboard > Plugins > Installed Plugins, locate 'WPC Smart Messages for WooCommerce', and click 'Update' if a newer version is available. As a temporary workaround pending patch application, restrict the Author and Editor roles from creating or editing smart messages to only trusted administrators; this can be managed via WordPress role and capability plugins. Review the Patchstack vulnerability database entry (https://patchstack.com/database/Wordpress/Plugin/wpc-smart-messages/vulnerability/wordpress-wpc-smart-messages-for-woocommerce-plugin-4-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve) for confirmation of the patched version and additional technical details from the plugin vendor.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today