CVE-2022-2518: CWE-352 Cross-Site Request Forgery (CSRF) in dholovnia Stockists Manager for Woocommerce
The Stockists Manager for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.2.1. This is due to missing nonce validation on the stockist_settings_main() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2022-2518 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Stockists Manager for Woocommerce plugin for WordPress, specifically versions up to and including 1.0.2.1. The vulnerability arises due to the absence of nonce validation in the stockist_settings_main() function, which is responsible for handling plugin settings. Nonce validation is a critical security mechanism in WordPress that helps verify that requests to perform sensitive actions originate from legitimate users and not from malicious third parties. Without this protection, an attacker can craft a malicious web request that, if an authenticated site administrator is tricked into clicking (for example, via a phishing email or malicious website), can cause the administrator's browser to unknowingly submit unauthorized changes to the plugin's settings. This can lead to the injection of malicious web scripts or unauthorized configuration changes, potentially compromising the integrity and confidentiality of the affected website. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation (no privileges required, no complex attack conditions, only user interaction needed). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for WordPress sites using this plugin. Since Woocommerce is a widely used e-commerce platform, exploitation could lead to severe consequences including site defacement, data theft, or further malware distribution.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and the Stockists Manager for Woocommerce plugin, this vulnerability poses a substantial risk. Successful exploitation could allow attackers to alter plugin settings, potentially injecting malicious scripts that compromise customer data, payment information, or site functionality. This can lead to data breaches violating GDPR regulations, resulting in legal penalties and reputational damage. Additionally, compromised e-commerce sites may suffer financial losses due to downtime, loss of customer trust, and remediation costs. Given the widespread use of WordPress and Woocommerce in Europe, particularly among small to medium-sized enterprises, the vulnerability could affect a broad range of sectors including retail, manufacturing, and distribution. The requirement for user interaction (administrator clicking a malicious link) means targeted phishing campaigns could be an effective attack vector, increasing the threat to organizations with less mature security awareness programs.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Stockists Manager for Woocommerce plugin to a version that includes nonce validation or apply any available patches from the vendor. If no patch is available, temporarily disabling the plugin or restricting access to the plugin settings page to trusted IP addresses can reduce risk. Implementing robust phishing awareness training for administrators is critical to prevent social engineering attacks that could trigger exploitation. Additionally, deploying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin’s endpoints can provide an extra layer of defense. Monitoring administrative actions and plugin configuration changes through logging and alerting can help detect suspicious activity early. Organizations should also ensure that WordPress core and all plugins are regularly updated and that security best practices, such as least privilege principles for admin accounts and multi-factor authentication, are enforced to minimize the attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2022-2518: CWE-352 Cross-Site Request Forgery (CSRF) in dholovnia Stockists Manager for Woocommerce
Description
The Stockists Manager for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.2.1. This is due to missing nonce validation on the stockist_settings_main() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2022-2518 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Stockists Manager for Woocommerce plugin for WordPress, specifically versions up to and including 1.0.2.1. The vulnerability arises due to the absence of nonce validation in the stockist_settings_main() function, which is responsible for handling plugin settings. Nonce validation is a critical security mechanism in WordPress that helps verify that requests to perform sensitive actions originate from legitimate users and not from malicious third parties. Without this protection, an attacker can craft a malicious web request that, if an authenticated site administrator is tricked into clicking (for example, via a phishing email or malicious website), can cause the administrator's browser to unknowingly submit unauthorized changes to the plugin's settings. This can lead to the injection of malicious web scripts or unauthorized configuration changes, potentially compromising the integrity and confidentiality of the affected website. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation (no privileges required, no complex attack conditions, only user interaction needed). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for WordPress sites using this plugin. Since Woocommerce is a widely used e-commerce platform, exploitation could lead to severe consequences including site defacement, data theft, or further malware distribution.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and the Stockists Manager for Woocommerce plugin, this vulnerability poses a substantial risk. Successful exploitation could allow attackers to alter plugin settings, potentially injecting malicious scripts that compromise customer data, payment information, or site functionality. This can lead to data breaches violating GDPR regulations, resulting in legal penalties and reputational damage. Additionally, compromised e-commerce sites may suffer financial losses due to downtime, loss of customer trust, and remediation costs. Given the widespread use of WordPress and Woocommerce in Europe, particularly among small to medium-sized enterprises, the vulnerability could affect a broad range of sectors including retail, manufacturing, and distribution. The requirement for user interaction (administrator clicking a malicious link) means targeted phishing campaigns could be an effective attack vector, increasing the threat to organizations with less mature security awareness programs.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Stockists Manager for Woocommerce plugin to a version that includes nonce validation or apply any available patches from the vendor. If no patch is available, temporarily disabling the plugin or restricting access to the plugin settings page to trusted IP addresses can reduce risk. Implementing robust phishing awareness training for administrators is critical to prevent social engineering attacks that could trigger exploitation. Additionally, deploying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin’s endpoints can provide an extra layer of defense. Monitoring administrative actions and plugin configuration changes through logging and alerting can help detect suspicious activity early. Organizations should also ensure that WordPress core and all plugins are regularly updated and that security best practices, such as least privilege principles for admin accounts and multi-factor authentication, are enforced to minimize the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-07-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc1fd
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:10:03 PM
Last updated: 8/14/2025, 4:50:14 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.