CVE-2025-0864

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) attacks via the 'shortcodes_set' parameter in the Active Products Tables for WooCommerce WordPress plugin. Attackers can inject malicious scripts that execute in victims' browsers when they click specially crafted links. All WordPress sites using this plugin up to version 1.0.6.6 are affected.

💻 Affected Systems

Products:
  • Active Products Tables for WooCommerce WordPress plugin
Versions: All versions up to and including 1.0.6.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. Vulnerability exists in default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on victim browsers.

🟠

Likely Case

Attackers will use this for session hijacking, credential theft, or delivering phishing pages to targeted users.

🟢

If Mitigated

With proper web application firewalls and browser security controls, impact is limited to individual user sessions rather than server compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized. Attack requires user interaction (clicking malicious link).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.0.6.6

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3235888%40profit-products-tables-for-woocommerce&new=3235888%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Active Products Tables for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block requests containing malicious script patterns in the shortcodes_set parameter

Disable Plugin

linux

Temporarily disable the plugin until patched

wp plugin deactivate profit-products-tables-for-woocommerce

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy a web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins → Installed Plugins

Check Version:

wp plugin get profit-products-tables-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.0.6.6 and test parameter with basic XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious script patterns in shortcodes_set parameter
  • Multiple failed XSS attempts from same IP

Network Indicators:

  • Unusual GET requests with encoded script tags in parameters
  • Traffic patterns matching reflected XSS exploitation

SIEM Query:

web.url:*shortcodes_set=* AND (web.url:*script* OR web.url:*javascript* OR web.url:*onerror*)

🔗 References

📤 Share & Export