CVE-2025-57903

5.9 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the WooCommerce Additional Fees On Checkout plugin allows attackers to inject malicious scripts that execute when other users view affected pages. WordPress sites using the vulnerable plugin versions are affected, potentially compromising user sessions and site integrity. The vulnerability requires administrative access to exploit but creates persistent threats.

💻 Affected Systems

Products:
  • WPSuperiors Developer WooCommerce Additional Fees On Checkout (Free)
Versions: All versions up to and including 1.5.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Exploitation requires administrative access to the WordPress dashboard.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with admin access could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users, potentially leading to complete site takeover.

🟠

Likely Case

Malicious administrators or compromised admin accounts could inject scripts that steal user data, deface the site, or redirect users to malicious content.

🟢

If Mitigated

With proper access controls and input validation, the impact is limited to potential data leakage from users who view malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative access to the WordPress dashboard where the plugin settings can be modified with malicious payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.5.0

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woo-additional-fees-on-checkout-wordpress/vulnerability/wordpress-woocommerce-additional-fees-on-checkout-free-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Additional Fees On Checkout (Free)'. 4. Click 'Update Now' if available. 5. If no update is available, deactivate and delete the plugin, then install the latest version from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate woo-additional-fees-on-checkout-wordpress

Restrict Admin Access

all

Limit administrative access to trusted users only and implement strong authentication

🧯 If You Can't Patch

  • Remove the plugin entirely and find alternative solutions for checkout fee functionality
  • Implement web application firewall (WAF) rules to block XSS payloads in plugin parameters

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin dashboard > Plugins > Installed Plugins for 'WooCommerce Additional Fees On Checkout (Free)' version 1.5.0 or earlier

Check Version:

wp plugin get woo-additional-fees-on-checkout-wordpress --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.5.0 in WordPress admin dashboard

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to plugin settings by admin users
  • Suspicious JavaScript payloads in plugin configuration data

Network Indicators:

  • Unexpected JavaScript execution on checkout pages
  • External script loads from checkout-related pages

SIEM Query:

source="wordpress" AND (plugin="woo-additional-fees-on-checkout" OR plugin_name="WooCommerce Additional Fees On Checkout") AND (action="activated" OR action="deactivated" OR action="updated")

🔗 References

📤 Share & Export