CVE-2021-34645: CWE-352 Cross-Site Request Forgery (CSRF) in WP EasyCart Shopping Cart & eCommerce Store
The Shopping Cart & eCommerce Store WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_currency_settings function found in the ~/admin/inc/wp_easycart_admin_initial_setup.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.1.0.
AI Analysis
Technical Summary
CVE-2021-34645 is a high-severity vulnerability affecting the WP EasyCart Shopping Cart & eCommerce Store WordPress plugin, specifically versions up to and including 5.1.0. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) found in the save_currency_settings function within the ~/admin/inc/wp_easycart_admin_initial_setup.php file. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request, which can lead to unauthorized actions being executed on the user's behalf without their consent. In this case, the vulnerability enables attackers to inject arbitrary web scripts by exploiting the lack of proper CSRF protections when saving currency settings. The CVSS 3.1 base score of 8.8 indicates a high impact, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H highlighting that the attack can be performed remotely over the network with low attack complexity, requires no privileges but does require user interaction (UI:R), and results in high confidentiality, integrity, and availability impacts. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the potential for attackers to manipulate eCommerce settings, inject malicious scripts, and compromise the integrity and availability of online stores using this plugin. The vulnerability was publicly disclosed in August 2021, and no official patch links are provided in the data, indicating that users must verify if updates or mitigations have been released since then.
Potential Impact
For European organizations operating eCommerce websites using the WP EasyCart plugin, this vulnerability could lead to severe consequences. Attackers exploiting this CSRF flaw could alter currency settings, potentially disrupting pricing, payment processing, and customer transactions. The injection of arbitrary scripts could facilitate further attacks such as session hijacking, data theft, or distribution of malware to customers. This undermines customer trust, damages brand reputation, and may lead to financial losses due to fraudulent transactions or downtime. Additionally, compromised eCommerce platforms may violate GDPR requirements concerning data protection and security, exposing organizations to regulatory penalties. The high confidentiality, integrity, and availability impacts mean that sensitive customer data and business operations are at risk, making this vulnerability particularly critical for European businesses reliant on WP EasyCart for their online sales.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify the version of WP EasyCart in use and upgrade to the latest version where the vulnerability is patched. If an official patch is not available, organizations should implement manual CSRF protections such as adding nonce verification tokens to the save_currency_settings function and validating these tokens server-side to ensure requests are legitimate. Additionally, restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) for admin users can reduce the risk of exploitation. Web Application Firewalls (WAFs) should be configured to detect and block suspicious CSRF attack patterns targeting the plugin’s endpoints. Regular security audits and monitoring for unusual administrative actions or changes in currency settings can help detect exploitation attempts early. Finally, educating administrators about the risks of CSRF and the importance of not clicking on suspicious links while logged into the admin panel can reduce user interaction risks.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34645: CWE-352 Cross-Site Request Forgery (CSRF) in WP EasyCart Shopping Cart & eCommerce Store
Description
The Shopping Cart & eCommerce Store WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_currency_settings function found in the ~/admin/inc/wp_easycart_admin_initial_setup.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 5.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2021-34645 is a high-severity vulnerability affecting the WP EasyCart Shopping Cart & eCommerce Store WordPress plugin, specifically versions up to and including 5.1.0. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) found in the save_currency_settings function within the ~/admin/inc/wp_easycart_admin_initial_setup.php file. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request, which can lead to unauthorized actions being executed on the user's behalf without their consent. In this case, the vulnerability enables attackers to inject arbitrary web scripts by exploiting the lack of proper CSRF protections when saving currency settings. The CVSS 3.1 base score of 8.8 indicates a high impact, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H highlighting that the attack can be performed remotely over the network with low attack complexity, requires no privileges but does require user interaction (UI:R), and results in high confidentiality, integrity, and availability impacts. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the potential for attackers to manipulate eCommerce settings, inject malicious scripts, and compromise the integrity and availability of online stores using this plugin. The vulnerability was publicly disclosed in August 2021, and no official patch links are provided in the data, indicating that users must verify if updates or mitigations have been released since then.
Potential Impact
For European organizations operating eCommerce websites using the WP EasyCart plugin, this vulnerability could lead to severe consequences. Attackers exploiting this CSRF flaw could alter currency settings, potentially disrupting pricing, payment processing, and customer transactions. The injection of arbitrary scripts could facilitate further attacks such as session hijacking, data theft, or distribution of malware to customers. This undermines customer trust, damages brand reputation, and may lead to financial losses due to fraudulent transactions or downtime. Additionally, compromised eCommerce platforms may violate GDPR requirements concerning data protection and security, exposing organizations to regulatory penalties. The high confidentiality, integrity, and availability impacts mean that sensitive customer data and business operations are at risk, making this vulnerability particularly critical for European businesses reliant on WP EasyCart for their online sales.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify the version of WP EasyCart in use and upgrade to the latest version where the vulnerability is patched. If an official patch is not available, organizations should implement manual CSRF protections such as adding nonce verification tokens to the save_currency_settings function and validating these tokens server-side to ensure requests are legitimate. Additionally, restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) for admin users can reduce the risk of exploitation. Web Application Firewalls (WAFs) should be configured to detect and block suspicious CSRF attack patterns targeting the plugin’s endpoints. Regular security audits and monitoring for unusual administrative actions or changes in currency settings can help detect exploitation attempts early. Finally, educating administrators about the risks of CSRF and the importance of not clicking on suspicious links while logged into the admin panel can reduce user interaction risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc921
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:11:05 PM
Last updated: 8/15/2025, 3:33:41 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.