Description
The WishSuite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_text' parameter of the 'wishsuite_button' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting via the button_text attribute of the wishsuite_button shortcode
Action: Apply Patch
AI Analysis

Impact

The WishSuite – Wishlist for WooCommerce plugin is vulnerable because the button_text attribute of the wishsuite_button shortcode is stored without proper sanitization or escaping. An attacker who can log in with Contributor or higher privileges can insert arbitrary JavaScript into that attribute. When a page containing the shortcode is rendered, the injected script runs in the browser of any visitor, potentially allowing theft of session cookies, defacement, or malicious redirects. This compromise affects the confidentiality and integrity of site content for users who view the affected page.

Affected Systems

All installations of the WishSuite – Wishlist for WooCommerce plugin for WordPress, specifically versions up to and including 1.5.1.

Risk and Exploitability

The CVSS score of 6.4 characterizes this flaw as a medium‑severity vulnerability. The EPSS score of less than 1% indicates a low probability of current exploitation, and the issue is not listed in CISA’s KEV catalog. Exploitation requires an authenticated user with Contributor-level access or higher who can edit content that includes the wishsuite_button shortcode. Once an injection is stored, any visitor who loads a page containing the shortcode will automatically execute the malicious script, so the impact is client‑side but can be used for serious user‑targeted attacks.

Generated by OpenCVE AI on April 21, 2026 at 16:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WishSuite to the latest version (1.5.2 or newer).
  • If an upgrade cannot be performed immediately, identify and edit all instances of the wishsuite_button shortcode to remove or sanitize the button_text attribute, or temporarily disable the shortcode on pages until the patch is applied.
  • Restrict Contributor-level and higher user roles from editing content that includes the wishsuite_button shortcode or downgrade those capabilities until the fix is in place.

Generated by OpenCVE AI on April 21, 2026 at 16:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Htplugins
Htplugins wishsuite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Htplugins
Htplugins wishsuite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Mon, 22 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 02:45:00 +0000

Type Values Removed Values Added
Description The WishSuite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_text' parameter of the 'wishsuite_button' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WishSuite <= 1.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'button_text' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Htplugins Wishsuite
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:40.521Z

Reserved: 2025-12-01T18:44:29.304Z

Link: CVE-2025-13838

cve-icon Vulnrichment

Updated: 2025-12-22T20:25:24.265Z

cve-icon NVD

Status : Deferred

Published: 2025-12-21T03:15:51.993

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13838

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses