Skip to main content

CVE-2022-2518: CWE-352 Cross-Site Request Forgery (CSRF) in dholovnia Stockists Manager for Woocommerce

High
VulnerabilityCVE-2022-2518cvecve-2022-2518cwe-352
Published: Tue Sep 06 2022 (09/06/2022, 17:18:58 UTC)
Source: CVE
Vendor/Project: dholovnia
Product: Stockists Manager for Woocommerce

Description

The Stockists Manager for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.2.1. This is due to missing nonce validation on the stockist_settings_main() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:10:03 UTC

Technical Analysis

CVE-2022-2518 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the Stockists Manager for Woocommerce plugin for WordPress, specifically versions up to and including 1.0.2.1. The vulnerability arises due to the absence of nonce validation in the stockist_settings_main() function, which is responsible for handling plugin settings. Nonce validation is a critical security mechanism in WordPress that helps verify that requests to perform sensitive actions originate from legitimate users and not from malicious third parties. Without this protection, an attacker can craft a malicious web request that, if an authenticated site administrator is tricked into clicking (for example, via a phishing email or malicious website), can cause the administrator's browser to unknowingly submit unauthorized changes to the plugin's settings. This can lead to the injection of malicious web scripts or unauthorized configuration changes, potentially compromising the integrity and confidentiality of the affected website. The CVSS v3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation (no privileges required, no complex attack conditions, only user interaction needed). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for WordPress sites using this plugin. Since Woocommerce is a widely used e-commerce platform, exploitation could lead to severe consequences including site defacement, data theft, or further malware distribution.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress and the Stockists Manager for Woocommerce plugin, this vulnerability poses a substantial risk. Successful exploitation could allow attackers to alter plugin settings, potentially injecting malicious scripts that compromise customer data, payment information, or site functionality. This can lead to data breaches violating GDPR regulations, resulting in legal penalties and reputational damage. Additionally, compromised e-commerce sites may suffer financial losses due to downtime, loss of customer trust, and remediation costs. Given the widespread use of WordPress and Woocommerce in Europe, particularly among small to medium-sized enterprises, the vulnerability could affect a broad range of sectors including retail, manufacturing, and distribution. The requirement for user interaction (administrator clicking a malicious link) means targeted phishing campaigns could be an effective attack vector, increasing the threat to organizations with less mature security awareness programs.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Stockists Manager for Woocommerce plugin to a version that includes nonce validation or apply any available patches from the vendor. If no patch is available, temporarily disabling the plugin or restricting access to the plugin settings page to trusted IP addresses can reduce risk. Implementing robust phishing awareness training for administrators is critical to prevent social engineering attacks that could trigger exploitation. Additionally, deploying web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin’s endpoints can provide an extra layer of defense. Monitoring administrative actions and plugin configuration changes through logging and alerting can help detect suspicious activity early. Organizations should also ensure that WordPress core and all plugins are regularly updated and that security best practices, such as least privilege principles for admin accounts and multi-factor authentication, are enforced to minimize the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2022-07-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc1fd

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:10:03 PM

Last updated: 8/14/2025, 4:50:14 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats