Operator note

Review plugin bug quietly exposes 80k WooCommerce sites - have you patched yet?

Wordfence uncovers high-risk stored XSS in Customer Reviews for WooCommerce versions up to 5.80.2, threatening 80,000 sites. Patch 5.81.0 - update now.

Illustration of hidden WooCommerce review plugin vulnerability showing risky and patched states with warning icons and worried character

More than 80,000 WordPress sites using the Customer Reviews for WooCommerce plugin are exposed to a high-severity stored cross-site scripting (XSS) flaw disclosed by Wordfence on 23 July 2025. The vulnerability lets unauthenticated attackers inject malicious JavaScript into review pages. A patched version, 5.81.0, is already available in the WordPress repository.

Vulnerability Overview

The weakness affects every plugin release through 5.80.2. Attackers can abuse the unsanitised author parameter in a review submission to store executable code that runs whenever someone opens the compromised page. Wordfence rated the risk as high because exploitation does not require user authentication.

Key Details

  • Disclosure date: 23 July 2025
  • Impacted versions: Customer Reviews for WooCommerce 5.80.2 and earlier
  • Attack vector: unsanitised author field in review forms
  • Impact: stored XSS that executes in visitors’ browsers on page load
  • Estimated installations affected: 80,000+ active sites
  • Fixed release: 5.81.0 (published by developer Ivory Dev)
  • Recommended action: update to 5.81.0 or later without delay
  • Source: Wordfence advisory

Background

Customer Reviews for WooCommerce automates post-purchase emails and showcases user-generated content to increase trust in online stores. Its popularity widens the pool of potential targets whenever a flaw emerges. Stored XSS issues have plagued other WordPress extensions in recent years, making fast patch management critical for site owners.

Wordfence maintains a public vulnerability database and supplies virtual patches to its firewall customers. WordPress.org guidelines require plugin developers to sanitise user input and escape output, the two controls missing from the affected code path. Ivory Dev received Wordfence’s report and released the fix following standard responsible disclosure practice.

Keep reading

Related articles

AI powered shopping cart protocol illustration with funnel price tag alert loyalty user tapping toggleInside Google's Universal Commerce Protocol that lets AI agents tap carts, catalogs and loyalty pricing2 min readMinimalist illustration of AI checkout hub with Cart Catalog Identity cards and user tapping settingsGoogle quietly upgrades AI shopping protocol: what Cart, Catalog and Identity Linking change next2 min readMinimalist tablet health UI privacy risk toggle character adjusting shield and prescription funnelGoogle and DocMorris Launch AI Health Companion for Europe - What Changes Next2 min readMinimalist site health dashboard illustration with 404 410 toggle funnel filtering errors into green checksWorried About Endless 404 Reports In Search Console? John Mueller Reveals What They Really Mean3 min read