VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-25119

CVE-2025-25119

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alejandro Aranda Woocommerce osCommerce Sync woo-oscommerce-sync allows Reflected XSS.This issue affects Woocommerce osCommerce Sync: from n/a through <= 2.0.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in Woocommerce osCommerce Sync (≤2.0.20) allows attackers to inject malicious scripts via unneutralized input.

Vulnerability

Description The Woocommerce osCommerce Sync plugin for WordPress (versions up to 2.0.20) contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This occurs in the woo-oscommerce-sync plugin, where insufficient sanitization enables an attacker to inject arbitrary HTML or JavaScript code into a page that will be executed in a victim's browser.

Exploitation

Conditions To exploit this vulnerability, an attacker must trick a privileged user (e.g., an administrator) into clicking a specially crafted link, visiting a malicious page, or submitting a form that reflects the payload back to the browser [1]. No direct authentication is required from the attacker, but user interaction from the target is necessary for successful exploitation. The vulnerability is expected to be targeted in mass-exploit campaigns, as it can affect thousands of WordPress sites running the plugin.

Impact

Successful exploitation allows an attacker to inject arbitrary scripts, which can perform actions such as redirecting visitors to malicious sites, injecting advertisements, or stealing session cookies [1]. This compromises the integrity and confidentiality of the affected WordPress site, potentially leading to further compromise of user accounts or site content.

Mitigation

The recommended action is to update the plugin to a patched version as soon as one becomes available. Until then, site owners should apply a mitigation rule (e.g., from Patchstack) that blocks attack vectors [1]. Sites where the plugin is no longer supported should consider disabling or replacing it, as unpatched instances remain vulnerable.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.