Description
The Live Sales Notification for Woocommerce – Woomotiv plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'woomotiv_limit' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-12-06
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting enabling arbitrary script execution
Action: Apply Patch
AI Analysis

Impact

The Live Sales Notification for WooCommerce - Woomotiv plugin is vulnerable to reflected cross‑site scripting via the woomotiv_limit parameter. The parameter is not properly sanitized or escaped before being rendered in a page, allowing an unauthenticated attacker to inject arbitrary JavaScript that will run when a user follows a crafted link. Based on the description, the likely attack vector involves an attacker tricking a user into clicking a URL that includes the vulnerable woomotiv_limit value.

Affected Systems

All releases of the Live Sales Notification for WooCommerce - Woomotiv plugin dated up to and including version 3.6.3 are affected. The product is a WordPress plugin used by site administrators to display real‑time sales notifications.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation. The flaw is not present in the CISA KEV catalog, yet it can be leveraged if an attacker persuades a user to click a malicious link containing the vulnerable woomotiv_limit parameter. Based on the description, the likely attack vector is a phishing‑style link that includes crafted input, requiring the victim to click in order to trigger the reflected XSS.

Generated by OpenCVE AI on April 22, 2026 at 20:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Live Sales Notification for WooCommerce - Woomotiv plugin to version 3.6.4 or later to remove the vulnerability.
  • If an update is not immediately possible, uninstall the plugin to eliminate the risk.
  • As a temporary measure, block or sanitize any request containing the woomotiv_limit parameter using a web application firewall or by enforcing a strict content‑security‑policy that prevents execution of user‑supplied scripts.

Generated by OpenCVE AI on April 22, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Delabon
Delabon woomotiv
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Delabon
Delabon woomotiv
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Mon, 08 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 06 Dec 2025 06:00:00 +0000

Type Values Removed Values Added
Description The Live Sales Notification for Woocommerce – Woomotiv plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'woomotiv_limit' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Live Sales Notification for Woocommerce – Woomotiv <= 3.6.3 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Delabon Woomotiv
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:46.602Z

Reserved: 2025-11-13T18:36:14.347Z

Link: CVE-2025-13137

cve-icon Vulnrichment

Updated: 2025-12-08T20:55:07.288Z

cve-icon NVD

Status : Deferred

Published: 2025-12-06T06:15:51.067

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13137

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:00:06Z

Weaknesses