VYPR
High severity7.1NVD Advisory· Published Jun 9, 2025· Updated Apr 23, 2026

CVE-2025-47487

CVE-2025-47487

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moreconvert Team MC Woocommerce Wishlist smart-wishlist-for-more-convert allows Reflected XSS.This issue affects MC Woocommerce Wishlist: from n/a through <= 1.9.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in MC Woocommerce Wishlist plugin (≤1.9.1) allows script injection via unescaped input; update to 1.9.2.

Vulnerability

Overview The MC Woocommerce Wishlist plugin (smart-wishlist-for-more-convert) for WordPress versions from n/a through 1.9.1 contains a Reflected Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user-supplied input during web page generation, enabling an attacker to inject arbitrary HTML or JavaScript into the response page. [1]

Exploitation

Conditions Exploitation requires user interaction; a victim must click a crafted link, visit a maliciously prepared page, or submit a specially designed form. No authentication is needed to trigger the flaw, but the victim must perform an action that causes the injected script to execute. Attackers can leverage this to target thousands of sites in mass campaigns, regardless of site popularity or traffic size. [1]

Impact

Successful exploitation allows an attacker to inject malicious scripts into the vulnerable site. This can lead to redirects, unauthorized ad insertion, defacement, or theft of sensitive information such as session cookies, all executed when legitimate visitors access the affected page. The CVSS v3 base score is 7.1 (High), reflecting moderate severity and the potential for widespread abuse. [1]

Mitigation

The vulnerability has been patched in version 1.9.2 of the plugin. Users are strongly advised to update to this version immediately. If an immediate update is not possible, a mitigation rule is available via Patchstack to block attacks until the plugin can be patched. Given the risk of mass exploitation, swift action is recommended. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.