CVE-2025-23495

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users through the WooCommerce Order Search plugin. It affects WordPress sites using vulnerable versions of this plugin, potentially compromising user sessions and data. The attack is reflected, meaning the malicious script comes from the current HTTP request.

💻 Affected Systems

Products:
  • WooCommerce Order Search WordPress Plugin
Versions: n/a through 1.1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface websites, or redirect users to malicious sites, potentially leading to full site compromise.

🟠

Likely Case

Session hijacking, credential theft from users who click malicious links, or limited website defacement.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (clicking a malicious link) and knowledge of vulnerable parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woocommerce-order-searching/vulnerability/wordpress-woocommerce-order-search-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Order Search'. 4. Click 'Update Now' if available, or manually update to version 1.1.1+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate woocommerce-order-searching

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules.
  • Restrict plugin access to trusted users only using authentication controls.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'WooCommerce Order Search' version 1.1.0 or earlier.

Check Version:

wp plugin get woocommerce-order-searching --field=version

Verify Fix Applied:

Confirm plugin version is 1.1.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags or JavaScript in query parameters to plugin endpoints.
  • Multiple failed login attempts following suspicious URL visits.

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript code in URL parameters related to order search functionality.

SIEM Query:

source="web_server_logs" AND (uri="*woocommerce-order-searching*" AND (query="*<script>*" OR query="*javascript:*"))

🔗 References

📤 Share & Export