Description
The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-08-19
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated Stored XSS
Action: Patch Now
AI Analysis

Impact

The vulnerable WPC Smart Compare for WooCommerce plugin allows authenticated users with Contributor role or higher to insert malicious script code into stored data that is subsequently rendered in a web page. This DOM‑based stored XSS flaw stems from missing input validation and output escaping, corresponding to CWE‑79. An attacker who injects a script can coerce any visitor of the affected page into executing the code, potentially leading to session hijacking, credential theft, or defacement, but only within the web interface of the affected WordPress site.

Affected Systems

WordPress sites running the WPC Smart Compare for WooCommerce plugin version 6.4.7 or earlier are affected. Any site that has installed this plugin and has users with Contributor-level permissions or higher can be used to embed the malicious payload.

Risk and Exploitability

The CVSS v3 score of 6.4 indicates a medium impact, while the EPSS score of less than 1% reflects a low probability of exploitation in the wild at the time of analysis. The flaw is not currently listed in the CISA KEV catalog. Attack requires legitimate credentials; thus an attacker must gain Contributor or higher access on the target site before injecting the script. Once injected, the payload runs automatically whenever a visitor loads the affected page, so the risk is confined to users of that site but can be high for anyone who accesses the compromised content.

Generated by OpenCVE AI on April 20, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WPC Smart Compare for WooCommerce plugin to the latest supported version (greater than 6.4.7).
  • If an immediate upgrade is not possible, disable the plugin for all Contributor or higher role users, or lock those roles to read‑only permissions so they cannot add new comparison data.
  • Implement a content security policy or WAF rule that blocks embedded <script> tags or other executable code in the comparison widget data to prevent script execution even if malicious input is stored.

Generated by OpenCVE AI on April 20, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25162 The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 21 Aug 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Compare For Woocommerce
Vendors & Products Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Compare For Woocommerce

Tue, 19 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 Aug 2025 03:45:00 +0000

Type Values Removed Values Added
Description The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WPC Smart Compare for WooCommerce <= 6.4.7 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpclever Wpc Smart Compare For Woocommerce
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:19:32.875Z

Reserved: 2025-07-11T14:53:36.056Z

Link: CVE-2025-7496

cve-icon Vulnrichment

Updated: 2025-08-19T19:22:02.201Z

cve-icon NVD

Status : Deferred

Published: 2025-08-19T04:15:47.897

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:00:10Z

Weaknesses