CVE-2025-62969

6.5 MEDIUM

📋 TL;DR

This stored XSS vulnerability in NextMove Lite WordPress plugin allows attackers to inject malicious scripts into thank-you pages, which execute when users view those pages. WordPress sites using NextMove Lite version 2.21.0 or earlier are affected, potentially compromising visitor browsers and site administrators.

💻 Affected Systems

Products:
  • XLPlugins NextMove Lite (woo-thank-you-page-nextmove-lite)
Versions: All versions through 2.21.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with WooCommerce and NextMove Lite plugin active. The vulnerability is in the thank-you page functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress admin accounts, deface websites, or redirect users to malicious sites, leading to complete site compromise.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies or credentials from visitors viewing thank-you pages, potentially leading to account takeover of those users.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users, preventing execution in browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to submit data that appears on thank-you pages (typically through order submissions or form inputs). The stored nature means payload persists until cleaned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.21.0

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/woo-thank-you-page-nextmove-lite/vulnerability/wordpress-nextmove-lite-plugin-2-21-0-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'NextMove Lite' and click 'Update Now'. 4. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable NextMove Lite Plugin

WordPress

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate woo-thank-you-page-nextmove-lite

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or use WordPress CSP plugin

🧯 If You Can't Patch

  • Disable the NextMove Lite plugin immediately
  • Implement web application firewall (WAF) rules to block XSS payloads in thank-you page parameters

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for NextMove Lite version. If version is 2.21.0 or earlier, you are vulnerable.

Check Version:

wp plugin get woo-thank-you-page-nextmove-lite --field=version

Verify Fix Applied:

After updating, verify NextMove Lite version shows higher than 2.21.0 in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to thank-you page endpoints with script tags or JavaScript in parameters
  • Multiple failed attempts to submit orders with suspicious payloads

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript in order-related parameters
  • Outbound connections from thank-you pages to unknown domains

SIEM Query:

source="wordpress.log" AND ("thank-you" OR "nextmove") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export