Etavrian
keyboard_arrow_right Created with Sketch.
News
keyboard_arrow_right Created with Sketch.

Review plugin bug quietly exposes 80k WooCommerce sites - have you patched yet?

Reviewed:
Andrii Daniv
1
min read
Jul 31, 2025
Illustration of hidden WooCommerce review plugin vulnerability showing risky and patched states with warning icons and worried character

More than 80,000 WordPress sites using the Customer Reviews for WooCommerce plugin are exposed to a high-severity stored cross-site scripting (XSS) flaw disclosed by Wordfence on 23 July 2025. The vulnerability lets unauthenticated attackers inject malicious JavaScript into review pages. A patched version, 5.81.0, is already available in the WordPress repository.

Vulnerability Overview

The weakness affects every plugin release through 5.80.2. Attackers can abuse the unsanitised author parameter in a review submission to store executable code that runs whenever someone opens the compromised page. Wordfence rated the risk as high because exploitation does not require user authentication.

Key Details

  • Disclosure date: 23 July 2025
  • Impacted versions: Customer Reviews for WooCommerce 5.80.2 and earlier
  • Attack vector: unsanitised author field in review forms
  • Impact: stored XSS that executes in visitors’ browsers on page load
  • Estimated installations affected: 80,000+ active sites
  • Fixed release: 5.81.0 (published by developer Ivory Dev)
  • Recommended action: update to 5.81.0 or later without delay
  • Source: Wordfence advisory

Background

Customer Reviews for WooCommerce automates post-purchase emails and showcases user-generated content to increase trust in online stores. Its popularity widens the pool of potential targets whenever a flaw emerges. Stored XSS issues have plagued other WordPress extensions in recent years, making fast patch management critical for site owners.

Wordfence maintains a public vulnerability database and supplies virtual patches to its firewall customers. WordPress.org guidelines require plugin developers to sanitise user input and escape output, the two controls missing from the affected code path. Ivory Dev received Wordfence’s report and released the fix following standard responsible disclosure practice.

Quickly summarize and get insighs with: 
Author
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Reviewed
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Quickly summarize and get insighs with: 
Table of contents