CVE-2025-48254

6.5 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the WPFactory Change Add to Cart Button Text for WooCommerce plugin allows attackers to inject malicious scripts into WordPress/WooCommerce pages. When exploited, these scripts execute in victims' browsers, potentially stealing session cookies, redirecting users, or performing actions on their behalf. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WPFactory Change Add to Cart Button Text for WooCommerce
Versions: n/a through 2.2.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with WooCommerce and this specific plugin installed. The vulnerability exists in the plugin's input handling for button text changes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, install backdoors, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers inject malicious JavaScript that steals user session cookies or redirects users to phishing pages, potentially compromising user accounts and enabling further attacks.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts would be neutralized before reaching users' browsers, preventing execution and limiting impact to data corruption at worst.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS vulnerabilities in WordPress plugins are frequently exploited in the wild. While no public PoC is confirmed, similar vulnerabilities are commonly weaponized within days of disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/add-to-cart-button-labels-for-woocommerce/vulnerability/wordpress-change-add-to-cart-button-text-for-woocommerce-2-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Change Add to Cart Button Text for WooCommerce'. 4. Click 'Update Now' if available, or download version 2.2.3+ from WordPress.org. 5. Replace plugin files if manual update required.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate add-to-cart-button-labels-for-woocommerce

Implement WAF rules

all

Add web application firewall rules to block XSS payloads targeting the vulnerable endpoint

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative methods for button text customization
  • Implement strict Content Security Policy (CSP) headers to mitigate script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Change Add to Cart Button Text for WooCommerce' version 2.2.2 or earlier

Check Version:

wp plugin get add-to-cart-button-labels-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 2.2.3 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin endpoints
  • JavaScript payloads in button text or label parameters
  • Multiple failed XSS attempts

Network Indicators:

  • Malicious script tags in HTTP requests to WooCommerce/WordPress endpoints
  • Unexpected redirects from product pages

SIEM Query:

source="wordpress.log" AND ("add-to-cart-button-labels" OR "button_text") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export