EUVD-2025-17538

| CVE-2025-48279 HIGH
2025-06-09 [email protected]
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17538
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 7.1

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Perdaan WC MyParcel Belgium allows Reflected XSS. This issue affects WC MyParcel Belgium: from 4.5.5 through beta.

Analysis

Reflected Cross-Site Scripting (XSS) vulnerability in the WC MyParcel Belgium WordPress plugin (versions 4.5.5 through beta) that allows unauthenticated attackers to inject arbitrary JavaScript into web pages viewed by users. An attacker can craft a malicious URL to execute scripts in a victim's browser within the context of the affected website, potentially stealing session cookies, performing unauthorized actions, or redirecting users to phishing sites. The CVSS 7.1 score reflects moderate severity with network-based attack vector, no privilege requirements, and user interaction dependency; active exploitation status and POC availability are currently unknown from public sources.

Technical Context

This vulnerability exploits improper input sanitization in the WC MyParcel Belgium plugin, which is a WordPress extension for e-commerce shipping integration with MyParcel (a Belgian parcel delivery service). The root cause is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating that user-supplied input is reflected directly into HTTP responses without proper encoding or validation. The affected product likely processes URL parameters or form data that are then rendered in HTML contexts without escaping special characters (such as <, >, ", '). This is a classic Reflected XSS vulnerability where the malicious payload must be delivered via a crafted URL or form submission, distinguishing it from Stored XSS. The WordPress plugin architecture suggests the vulnerability exists in a page handler, AJAX endpoint, or parameter processing function within the plugin's codebase.

Affected Products

WC MyParcel Belgium (WordPress Plugin) - Affected Versions: 4.5.5 through beta (inclusive). The plugin is maintained by Richard Perdaan and integrates with the MyParcel shipping platform. Estimated CPE: cpe:2.3:a:richard_perdaan:wc_myparcel_belgium:*:*:*:*:*:wordpress:*:* (versions 4.5.5 and later up to and including beta releases). Affected installations include all WordPress sites running WC MyParcel Belgium within the specified version range. Secondary affected parties include users of WordPress e-commerce platforms (WooCommerce) that depend on this plugin for shipping label generation and tracking integration.

Remediation

Immediate actions: (1) Update WC MyParcel Belgium to the latest stable release beyond beta that includes XSS input validation fixes - contact Richard Perdaan or check the WordPress.org plugin repository for patched versions; (2) If no patch is available, disable the WC MyParcel Belgium plugin temporarily and switch to an alternative shipping integration method; (3) Implement Web Application Firewall (WAF) rules to detect and block reflected XSS payloads in URL parameters commonly used by the plugin; (4) Apply WordPress security hardening: update WordPress core, all plugins, and themes to latest versions, and enable Content Security Policy (CSP) headers to restrict inline script execution. Long-term: Monitor the official plugin repository and vendor security advisories for patch releases. Developers should review and patch input validation in page handlers, AJAX endpoints, and template rendering functions to use proper output encoding functions (e.g., esc_attr(), esc_html(), wp_kses_post() in WordPress).

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

EUVD-2025-17538 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy