Description
The FastSpring plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fastspring/block-fastspringblocks-complete-product-catalog' block in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on the 'color' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-31
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The FastSpring WordPress plugin allows authenticated users with contributor‑level or higher rights to inject malicious JavaScript into the "color" attribute of its product catalog block. The input is not sanitized and the output is not escaped, so the attacker can store scripts that run whenever a page containing the block is viewed. The impact is that scripts execute in the context of the site visitor, potentially enabling session hijacking, defacement, or phishing attacks.

Affected Systems

The vulnerability affects the FastSpring plugin developed by jtewes, available on WordPress. All releases up to and including 3.0.1 are impacted. It applies to any WordPress site that has this plugin installed and uses the product catalog block.

Risk and Exploitability

With a CVSS score of 6.4 the vulnerability presents moderate severity. The EPSS score is less than 1 %, indicating a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. An attacker must be authenticated with contributor privileges or higher and must be able to edit pages that use the product catalog block. Once the malicious code is stored it is triggered for any visitor who loads the affected page, giving the attacker a persistence vector. Close monitoring of user activity and contributor permissions is advised while a patch is applied.

Generated by OpenCVE AI on April 20, 2026 at 22:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FastSpring plugin to the latest version (3.0.2 or newer) to obtain the fix for the XSS vulnerability.
  • Disable or remove the "fastspring/block-fastspringblocks-complete-product-catalog" block from any page or post that does not require it to limit exposure.
  • Review and restrict contributor permissions on the WordPress site, ensuring only trusted users have the ability to edit content that can embed the vulnerable block.

Generated by OpenCVE AI on April 20, 2026 at 22:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16541 The FastSpring plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fastspring/block-fastspringblocks-complete-product-catalog' block in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on the 'color' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 31 May 2025 06:45:00 +0000

Type Values Removed Values Added
Description The FastSpring plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fastspring/block-fastspringblocks-complete-product-catalog' block in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on the 'color' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title FastSpring <= 3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:30:46.564Z

Reserved: 2025-05-12T15:47:17.563Z

Link: CVE-2025-4595

cve-icon Vulnrichment

Updated: 2025-06-02T15:17:48.500Z

cve-icon NVD

Status : Deferred

Published: 2025-05-31T07:15:20.840

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses