CVE-2025-13387
Kadence · Kadence WooCommerce Email Designer plugin for WordPress
A high-severity vulnerability has been identified in the Kadence WooCommerce Email Designer plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the Kadence WooCommerce Email Designer plugin for WordPress. This flaw allows an attacker to inject malicious code into the website by using a specially crafted customer name, which is then stored in the database. When an administrator views the compromised data, the malicious code executes, potentially leading to a full compromise of the website's administrative functions, data theft, or further attacks.
Vulnerability
The vulnerability is a Stored Cross-Site Scripting (XSS) flaw. The application fails to properly sanitize the 'customer name' input field before storing it in the database and rendering it in administrative views, such as email templates or order details. An unauthenticated attacker can exploit this by creating a user account or placing an order with a malicious script embedded in their name (e.g., <script>do_evil_stuff()</script>). When a logged-in administrator views the order or customer details, the malicious script executes within the context of the administrator's browser, allowing the attacker to hijack their session, steal credentials, perform administrative actions, or inject further malware.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could lead to a complete compromise of the website's administrative panel. This could result in significant business consequences, including the theft of sensitive customer data (personally identifiable information, order history), unauthorized financial transactions, website defacement causing reputational damage, and the use of the compromised website to launch further attacks against customers. The potential for data breaches may also trigger regulatory penalties and loss of customer trust.
Remediation
Immediate Action: Immediately update the Kadence WooCommerce Email Designer plugin to the latest available version that patches this vulnerability (a version greater than 1). If the plugin is not critical to business operations, consider deactivating and removing it to eliminate the attack surface entirely.
Proactive Monitoring: Monitor web server access logs and Web Application Firewall (WAF) logs for POST requests to customer creation or checkout pages that contain HTML tags, script tags, or other suspicious characters within name fields. Review WordPress audit logs for any unauthorized administrative activities, such as the creation of new admin accounts, unexpected plugin installations, or changes to core files.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block common XSS attack payloads in user-submitted data. Additionally, implementing a strict Content Security Policy (CSP) can help mitigate the impact of an XSS attack by preventing the browser from executing unauthorized scripts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.2) and the potential for a full site compromise, it is strongly recommended that organizations using the affected plugin apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed on the CISA KEV catalog, its direct impact on a widely used e-commerce platform (WooCommerce) makes it an attractive target for attackers. Organizations should prioritize updating the Kadence WooCommerce Email Designer plugin and conduct a review of all installed plugins to ensure they are necessary, up-to-date, and from reputable sources.