Description
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author’ parameter in all versions up to, and including, 5.80.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-31
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Customer Reviews for WooCommerce plugin allows the author field of user reviews to be stored without proper sanitization or escaping. When an attacker supplies malicious code in this field, that script becomes embedded in the review list page and is executed whenever a user views the page. This stored XSS flaw permits the execution of arbitrary scripts in the context of site visitors.

Affected Systems

Vulnerable versions of the Customer Reviews for WooCommerce plugin from ivole up to and including version 5.80.2 are affected. Sites that continue to run any of these releases expose all visitors to the risk of injected script execution.

Risk and Exploitability

The CVSS score of 6.4 signals moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation at the present time. The flaw is not listed in the CISA KEV catalog. Because it can be triggered without authentication, any user who can submit a review can inject code that persists and runs for all subsequent visitors to the review page.

Generated by OpenCVE AI on April 22, 2026 at 00:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Customer Reviews for WooCommerce plugin to version 5.80.3 or later, which removes the unsanitized author input.
  • If an upgrade cannot be applied immediately, temporarily disable the author field in the review form and apply a sanitization routine such as wp_kses_post to any displayed author content.
  • If immediate changes are impossible, consider deactivating or uninstalling the Customer Reviews for WooCommerce plugin to eliminate the attack surface.

Generated by OpenCVE AI on April 22, 2026 at 00:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23232 The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author’ parameter in all versions up to, and including, 5.80.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 31 Jul 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Cusrev
Cusrev customer Reviews For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Cusrev
Cusrev customer Reviews For Woocommerce
Wordpress
Wordpress wordpress

Thu, 31 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author’ parameter in all versions up to, and including, 5.80.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Customer Reviews for WooCommerce <= 5.80.2 - Unauthenticated Stored Cross-Site Scripting via `author` Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Cusrev Customer Reviews For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:45.446Z

Reserved: 2025-06-05T10:30:57.503Z

Link: CVE-2025-5720

cve-icon Vulnrichment

Updated: 2025-07-31T18:13:23.015Z

cve-icon NVD

Status : Deferred

Published: 2025-07-31T05:15:26.057

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5720

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:00:04Z

Weaknesses