CVE-2025-13369
Unknown Unknown - Not Provided
Reflected XSS in Premmerce WooCommerce Customers Manager Plugin

Publication date: 2026-01-07

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Premmerce WooCommerce Customers Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'money_spent_from', 'money_spent_to', 'registered_from', and 'registered_to' parameters in all versions up to, and including, 1.1.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-07
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-01-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
premmerce woo_customers_manager to 1.1.14 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-13369 is a Reflected Cross-Site Scripting (XSS) vulnerability in the Premmerce WooCommerce Customers Manager WordPress plugin (up to version 1.1.14). It occurs because the plugin does not properly sanitize or escape input from certain GET parameters ('money_spent_from', 'money_spent_to', 'registered_from', and 'registered_to') used in the user filtering functionality. This allows an unauthenticated attacker to inject malicious scripts that execute if an administrator is tricked into clicking a crafted link, potentially compromising the admin interface. [2, 4]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to inject arbitrary scripts that execute in the context of an administrator's browser, potentially leading to unauthorized access or manipulation of user data. This could result in exposure or compromise of personal data managed by the WooCommerce Customers Manager plugin, thereby impacting compliance with data protection regulations such as GDPR or HIPAA which require safeguarding personal information against unauthorized access and ensuring data integrity. However, specific compliance impacts are not detailed in the provided resources. [2, 4]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary scripts in the context of the WordPress admin panel if they can trick an administrator into clicking a malicious link. This can lead to unauthorized actions, theft of sensitive information, session hijacking, or other malicious activities within the admin interface. Since the attacker is unauthenticated, it poses a significant risk to site security and integrity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the Premmerce WooCommerce Customers Manager plugin version is 1.1.14 or earlier and by testing the vulnerable GET parameters 'money_spent_from', 'money_spent_to', 'registered_from', and 'registered_to' for reflected Cross-Site Scripting (XSS) payloads. Since the vulnerability arises from insufficient input sanitization in these parameters, you can attempt to inject simple XSS payloads in URLs accessing the WordPress admin users filtering interface, for example by crafting URLs with these parameters containing script tags and observing if the scripts execute when an administrator clicks the link. Specific commands would involve using curl or browser-based testing tools to send requests with these parameters. Example curl command to test injection: curl -i -k -X GET "https://yourwordpresssite.com/wp-admin/users.php?money_spent_from=<script>alert(1)</script>". Monitoring web server logs for suspicious requests containing these parameters with script tags can also help detect exploitation attempts. [2, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Premmerce WooCommerce Customers Manager plugin to a version later than 1.1.14 where the vulnerability is fixed. If an update is not immediately available, restrict access to the WordPress admin users filtering interface to trusted administrators only, and avoid clicking on suspicious links containing the vulnerable parameters. Additionally, implement web application firewall (WAF) rules to block requests containing suspicious script payloads in the 'money_spent_from', 'money_spent_to', 'registered_from', and 'registered_to' parameters. As a temporary measure, disable or remove the plugin if possible until a patch is applied. [2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart