CVE-2025-6743

6.4 MEDIUM

📋 TL;DR

The Woodmart WordPress theme has a stored XSS vulnerability in versions up to 8.2.3 that allows authenticated attackers with contributor-level access or higher to inject malicious scripts into web pages. These scripts execute when users visit the compromised pages, potentially stealing credentials or performing unauthorized actions. This affects all WordPress sites using vulnerable Woodmart theme versions.

💻 Affected Systems

Products:
  • Woodmart WordPress Theme
Versions: All versions up to and including 8.2.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Woodmart theme installed and contributor-level authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies or credentials, potentially gaining higher privileges.

🟢

If Mitigated

With proper access controls and input validation, impact is limited to low-privilege data exposure from contributor accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.2.4 or later

Vendor Advisory: https://themeforest.net/item/woodmart-woocommerce-wordpress-theme/20264492

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Woodmart theme updates. 4. Update to version 8.2.4 or later. 5. Clear any caching plugins.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily disable contributor-level user accounts until patching is complete.

Content Security Policy

all

Implement strict CSP headers to mitigate XSS impact.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to wp-config.php: header("Content-Security-Policy: default-src 'self'");

🧯 If You Can't Patch

  • Restrict user roles to only trusted administrators
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes > Woodmart theme details for version number.

Check Version:

wp theme list --field=name,version --format=csv | grep woodmart

Verify Fix Applied:

Confirm Woodmart theme version is 8.2.4 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to theme files with script tags
  • Multiple failed login attempts followed by contributor account access

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site
  • Unexpected script tags in theme-related HTTP responses

SIEM Query:

source="wordpress.log" AND ("multiple_markers" OR "woodmart") AND ("script" OR "onclick" OR "javascript:")

🔗 References

📤 Share & Export