CVE-2025-10167
BaseFortify
Publication date: 2025-10-11
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| woocommerce | stock_history_reports_manager | * |
| woocommerce | woocommerce | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Stock History & Reports Manager for WooCommerce plugin for WordPress. It occurs in the plugin's 'alg_wc_stock_snapshot_restocked' shortcode in all versions up to and including 2.2.1. The problem arises because the plugin does not properly sanitize or escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts are stored and executed whenever any user accesses the affected page, potentially compromising user security.
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker with contributor-level access or higher to inject arbitrary malicious scripts into pages using the vulnerable shortcode. When other users visit these pages, the injected scripts execute in their browsers, which can lead to theft of sensitive information, session hijacking, defacement, or other malicious actions. This compromises the security and integrity of the affected WordPress site and its users.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update the Stock History & Reports Manager for WooCommerce plugin to a version later than 2.2.1 where the input sanitization and output escaping issues are fixed. Additionally, restrict contributor-level access and above to trusted users only, as the vulnerability requires authenticated access. Monitor and review any pages using the 'alg_wc_stock_snapshot_restocked' shortcode for suspicious injected scripts and remove them. Consider disabling or removing the shortcode usage until the plugin is updated.