VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23903

CVE-2025-23903

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in woofx Local Shipping Labels for WooCommerce local-shipping-labels-for-woocommerce allows Reflected XSS.This issue affects Local Shipping Labels for WooCommerce: from n/a through <= 1.0.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in Local Shipping Labels for WooCommerce plugin (≤1.0.0) allows attackers to inject malicious scripts via crafted requests, requiring user interaction.

Vulnerability

Description The Local Shipping Labels for WooCommerce plugin (versions up to and including 1.0.0) suffers from a reflected cross-site scripting vulnerability due to improper neutralization of user input during page generation [1]. This means that attacker-controlled parameters can be injected into web pages without proper sanitization, making the site vulnerable to script injection.

Exploitation

Prerequisites Exploitation of this vulnerability requires user interaction, such as a privileged user clicking a malicious link or visiting a crafted page [1]. The attacker does not need prior authentication but must trick a user into taking an action. This type of vulnerability is commonly used in mass-exploit campaigns targeting WordPress sites regardless of size [1].

Impact

Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript into the affected website's pages [1]. This can be used to perform actions such as redirecting visitors to malicious sites, displaying advertisements, stealing session cookies, or defacing the site. The CVSS score of 7.1 (High) reflects its potential for significant harm with low attack complexity.

Mitigation

Users should update the plugin to a patched version as soon as possible [1]. Patchstack has issued a mitigation rule to block attacks until an official patch is available. Given that the vulnerability is expected to become exploited, immediate action is recommended. If updating is not possible, consult your hosting provider or web developer for assistance.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.