CVE-2025-62903

MEDIUM
2025-10-27 [email protected]
5.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Oct 27, 2025 - 02:15 nvd
MEDIUM 5.4

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPClever WPC Smart Messages for WooCommerce wpc-smart-messages allows Stored XSS.This issue affects WPC Smart Messages for WooCommerce: from n/a through <= 4.2.8.

Analysis

Stored cross-site scripting (XSS) in WPClever WPC Smart Messages for WooCommerce plugin versions up to 4.2.8 allows authenticated users with limited privileges to inject malicious scripts that execute in the browsers of other site visitors. The vulnerability requires user interaction (UI:R) and affects confidentiality and integrity through script injection, with a CVSS score of 5.4 reflecting moderate risk; however, the 0.02% EPSS score indicates minimal real-world exploitation probability at time of analysis, and no public exploit code or active exploitation has been confirmed.

Technical Context

The vulnerability stems from improper input sanitization and output encoding in the WPC Smart Messages plugin for WooCommerce, a WordPress extension. CWE-79 (Improper Neutralization of Input During Web Page Generation) indicates that user-supplied input is not adequately neutralized before being rendered in the HTML context of web pages. The plugin likely fails to escape or sanitize message content at the point of storage or rendering, allowing authenticated users (typically with Author or Editor roles, given PR:L) to embed JavaScript payloads that persist in the database and execute when other users (including administrators) view or interact with the messages. The CVSS vector shows network-based attack vector (AV:N) with low attack complexity (AC:L), meaning no specialized tools or conditions are required beyond normal plugin functionality.

Affected Products

WPClever WPC Smart Messages for WooCommerce plugin versions from an unspecified initial version through and including version 4.2.8 are affected. The plugin is distributed via the WordPress.org plugin repository and is commonly installed on WooCommerce-based e-commerce sites. No CPE string was provided in the reference data, but the plugin can be identified via WordPress plugin slug 'wpc-smart-messages' and its presence in WordPress installations via the Patchstack vulnerability database link provided.

Remediation

Update WPC Smart Messages for WooCommerce to a version newer than 4.2.8 where input sanitization and output encoding have been corrected; check the plugin's changelog or the WPClever vendor site for the patched release version. Users should navigate to WordPress Dashboard > Plugins > Installed Plugins, locate 'WPC Smart Messages for WooCommerce', and click 'Update' if a newer version is available. As a temporary workaround pending patch application, restrict the Author and Editor roles from creating or editing smart messages to only trusted administrators; this can be managed via WordPress role and capability plugins. Review the Patchstack vulnerability database entry (https://patchstack.com/database/Wordpress/Plugin/wpc-smart-messages/vulnerability/wordpress-wpc-smart-messages-for-woocommerce-plugin-4-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve) for confirmation of the patched version and additional technical details from the plugin vendor.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +27
POC: 0

Share

CVE-2025-62903 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy