The Plugin Oficial WordPress plugin through 1.7.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 01 Aug 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Coffee-code plugin Oficial
CPEs cpe:2.3:a:coffee-code:getnet_para_woocommerce:*:*:*:*:*:wordpress:*:* cpe:2.3:a:coffee-code:plugin_oficial:*:*:*:*:*:wordpress:*:*
Vendors & Products Coffee-code getnet Para Woocommerce
Coffee-code plugin Oficial

Wed, 04 Jun 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Coffee-code
Coffee-code getnet Para Woocommerce
Weaknesses CWE-79
CPEs cpe:2.3:a:coffee-code:getnet_para_woocommerce:*:*:*:*:*:wordpress:*:*
Vendors & Products Coffee-code
Coffee-code getnet Para Woocommerce

Tue, 20 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The Plugin Oficial WordPress plugin through 1.7.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.
Title Plugin Oficial – Getnet para WooCommerce <= 1.7.3 - Unauthenticated Reflected XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-05-20T17:39:20.947Z

Reserved: 2025-02-14T18:20:07.469Z

Link: CVE-2025-1303

cve-icon Vulnrichment

Updated: 2025-05-19T19:30:37.829Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:16:02.387

Modified: 2025-08-01T01:58:31.323

Link: CVE-2025-1303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.