CVE-2025-11727

Omnichannel · Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto

A high-severity vulnerability has been identified in a popular WordPress e-commerce integration plugin, "Omnichannel for WooCommerce" by Codisto.

Executive summary

A high-severity vulnerability has been identified in a popular WordPress e-commerce integration plugin, "Omnichannel for WooCommerce" by Codisto. This flaw allows an attacker to inject malicious code into the website, which is then permanently stored on the server. This could lead to the compromise of administrator accounts, theft of sensitive customer data, or a complete takeover of the affected e-commerce site.

Vulnerability

The vulnerability is a Stored Cross-Site Scripting (XSS) flaw within the plugin's sync() function. An attacker can craft a malicious input containing JavaScript code and submit it to the application through a process handled by this function. The application fails to properly sanitize this input before storing it in the database. Consequently, when an authenticated user (such as an administrator) views the page containing the malicious data, the stored script executes within their browser, inheriting their permissions and session context. This can lead to session hijacking, credential theft, or unauthorized administrative actions.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could have a significant negative impact on the business. An attacker could compromise administrator accounts, leading to a full site takeover. They could steal sensitive customer data, including personal identifiable information (PII), leading to regulatory fines and reputational damage. Furthermore, the attacker could deface the website, inject malware to infect visitors, or manipulate product listings, directly impacting revenue and customer trust.

Remediation

Immediate Action: Apply the security patch provided by the vendor (Codisto) immediately. Before updating, perform a full backup of the website and database. After patching, monitor the application for any signs of exploitation by reviewing web server and application access logs for unusual activity or requests targeting the plugin's functionality.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. Review logs for suspicious POST requests to the plugin's endpoints, particularly those associated with the sync() function, looking for payloads containing script tags (<script>, <iframe>, onerror). Regularly audit database tables related to the plugin for stored JavaScript code in data fields.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a robust ruleset to detect and block XSS attacks. Restrict administrative access to the WordPress dashboard to trusted IP addresses only. Enforce strong content security policies (CSP) to limit the execution of untrusted scripts.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating and the critical function of the affected e-commerce plugin, it is strongly recommended that organizations patch this vulnerability with the highest priority. Although there is no evidence of active exploitation, the potential impact of a successful attack on business operations and customer data is severe. Proactive patching is the most effective measure to mitigate the risk associated with CVE-2025-11727.