CVE-2025-47554

QuanticaLabs · QuanticaLabs CSS3 Compare Pricing Tables for WordPress

A high-severity vulnerability has been identified in the QuanticaLabs CSS3 Compare Pricing Tables plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the QuanticaLabs CSS3 Compare Pricing Tables plugin for WordPress. This flaw, a Reflected Cross-Site Scripting (XSS) vulnerability, could allow an attacker to execute malicious scripts in a user's browser by tricking them into clicking a specially crafted link. Successful exploitation could lead to the theft of session cookies, unauthorized actions on behalf of the user, or redirection to malicious websites, posing a significant risk to site integrity and user data.

Vulnerability

The vulnerability is a Reflected Cross-Site Scripting (XSS) flaw resulting from the improper sanitization of user-supplied input. An attacker can craft a malicious URL containing a JavaScript payload and send it to a victim (e.g., via a phishing email or social media message). When the victim clicks the link, their browser sends the malicious payload to the vulnerable WordPress site, which then includes the script in the HTML page it "reflects" back to the victim's browser. The browser executes the script, allowing the attacker to perform actions within the victim's session context, such as stealing authentication cookies, capturing keystrokes, or defacing the webpage viewed by the victim.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. If an administrator or other privileged user is successfully targeted, an attacker could gain full administrative control over the WordPress website. The potential consequences include website defacement, theft of sensitive customer or business data, installation of backdoors, and using the compromised website to host malware or launch further attacks. This poses a direct risk to the organization's reputation, customer trust, and operational stability.

Remediation

Immediate Action: Immediately identify all WordPress sites using the "QuanticaLabs CSS3 Compare Pricing Tables" plugin and update it to the latest patched version provided by the vendor. If the plugin is not essential for business operations, the recommended course of action is to deactivate and completely remove it to eliminate the attack surface.

Proactive Monitoring: Monitor web server access logs for GET requests with unusual URL parameters containing HTML or script tags (e.g., <script>, onerror=, onload=). Implement a Web Application Firewall (WAF) and ensure its ruleset is updated to detect and block common XSS attack patterns. Monitor for any unauthorized changes to website content or the creation of new administrative accounts.

Compensating Controls: If patching cannot be performed immediately, implement a WAF with strict XSS filtering rules as a primary compensating control. Additionally, enforcing a strong Content Security Policy (CSP) can help mitigate the risk by preventing browsers from executing untrusted inline scripts, even if an attacker successfully injects them.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.1) of this vulnerability and the potential for complete website compromise, we recommend immediate action. Organizations must prioritize applying the vendor-supplied patch to the affected plugin across all WordPress instances. Although this CVE is not currently listed on the CISA KEV list, the ease of exploitation via social engineering warrants urgent remediation. A thorough review should be conducted to identify if the plugin is still necessary; if not, it should be removed to reduce the overall attack surface.