VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23481

CVE-2025-23481

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anzar Ahmed Ni WooCommerce Sales Report Email ni-woocommerce-sales-report-email allows Reflected XSS.This issue affects Ni WooCommerce Sales Report Email: from n/a through <= 3.1.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Ni WooCommerce Sales Report Email plugin (<=3.1.4) allows attackers to inject malicious scripts via crafted requests, requiring user interaction.

Vulnerability

Overview

The Ni WooCommerce Sales Report Email plugin for WordPress versions 3.1.4 and earlier contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw allows an attacker to inject arbitrary HTML and JavaScript into a response, which is then executed in the context of the victim's browser.

Exploitation

Conditions

Exploitation requires user interaction: a privileged user (such as an administrator) must click a crafted link, visit a specially prepared page, or submit a malicious form [1]. The attacker does not need authentication but relies on social engineering to trick the victim into performing the action. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Impact

Successful exploitation enables the attacker to inject malicious scripts that can perform actions such as redirecting visitors to attacker-controlled sites, displaying unwanted advertisements, or stealing sensitive information [1]. Because the script runs in the context of the victim's session, it can also be used to modify site content or perform actions on behalf of the logged-in user.

Mitigation

The recommended action is to update the plugin to a patched version beyond 3.1.4 as soon as possible [1]. For sites that cannot immediately update, Patchstack provides a mitigation rule that blocks attacks until an official patch can be applied [1]. Administrators should also educate users about the risks of clicking untrusted links.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.