CVE-2022-3451: CWE-862 Missing Authorization in Unknown Product Stock Manager
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options
AI Analysis
Technical Summary
CVE-2022-3451 is a security vulnerability identified in the Product Stock Manager WordPress plugin versions prior to 1.0.5. The core issue is a lack of proper authorization and Cross-Site Request Forgery (CSRF) protections in multiple AJAX actions exposed by the plugin. Specifically, users with the minimal WordPress role of 'subscriber'—which is typically assigned to unprivileged users—can invoke these AJAX actions without sufficient permission checks. One critical action allows such users to update arbitrary options within the WordPress environment. This means that an attacker with a low-privilege account can manipulate plugin or site settings, potentially altering the behavior or configuration of the website. The vulnerability stems from CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery), indicating that the plugin fails to verify whether the requesting user is authorized to perform the requested actions and does not protect against forged requests. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (remote), requires low privileges (subscriber role), does not require user interaction, and impacts integrity but not confidentiality or availability. No known exploits have been reported in the wild, and no official patches or updates have been linked, though version 1.0.5 is noted as the fixed version. The vulnerability affects the Product Stock Manager plugin, which is used to manage inventory and stock details on WordPress sites, typically for e-commerce or retail-related websites. Exploitation could lead to unauthorized changes in stock data or site options, potentially disrupting business operations or enabling further attacks through misconfiguration.
Potential Impact
For European organizations, especially those operating e-commerce platforms or retail websites using WordPress with the Product Stock Manager plugin, this vulnerability poses a moderate risk. Unauthorized modification of plugin options could lead to inaccurate stock information, affecting sales, customer trust, and inventory management. More critically, if attackers manipulate site options, they might create conditions for privilege escalation, site defacement, or insertion of malicious code, thereby compromising the integrity of the website. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise can indirectly affect business continuity and reputation. Given the widespread use of WordPress in Europe and the importance of e-commerce in the region, organizations relying on this plugin without timely updates may face operational disruptions. The absence of known exploits reduces immediate risk, but the low privilege required and lack of user interaction make it a plausible target for opportunistic attackers. Additionally, the vulnerability could be leveraged as a foothold for more sophisticated attacks within compromised environments.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately verify if the Product Stock Manager plugin is installed and identify the version in use. 2) Upgrade the plugin to version 1.0.5 or later, where the authorization and CSRF checks have been properly implemented. If an official patch is unavailable, consider disabling or removing the plugin until a secure version is released. 3) Restrict user roles and permissions rigorously, ensuring that subscriber accounts cannot access administrative or sensitive AJAX endpoints. 4) Implement Web Application Firewall (WAF) rules to monitor and block suspicious AJAX requests that attempt to modify options or perform unauthorized actions. 5) Conduct regular audits of WordPress user accounts and plugin configurations to detect unauthorized changes. 6) Employ security plugins that add additional authorization layers and CSRF protections for AJAX actions. 7) Monitor logs for unusual activity related to AJAX calls or option updates, especially from low-privilege accounts. 8) Educate site administrators about the risks of installing plugins from unverified sources and the importance of timely updates. These measures go beyond generic advice by focusing on role-based access control, monitoring AJAX endpoints, and leveraging WAF capabilities tailored to WordPress environments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2022-3451: CWE-862 Missing Authorization in Unknown Product Stock Manager
Description
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options
AI-Powered Analysis
Technical Analysis
CVE-2022-3451 is a security vulnerability identified in the Product Stock Manager WordPress plugin versions prior to 1.0.5. The core issue is a lack of proper authorization and Cross-Site Request Forgery (CSRF) protections in multiple AJAX actions exposed by the plugin. Specifically, users with the minimal WordPress role of 'subscriber'—which is typically assigned to unprivileged users—can invoke these AJAX actions without sufficient permission checks. One critical action allows such users to update arbitrary options within the WordPress environment. This means that an attacker with a low-privilege account can manipulate plugin or site settings, potentially altering the behavior or configuration of the website. The vulnerability stems from CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery), indicating that the plugin fails to verify whether the requesting user is authorized to perform the requested actions and does not protect against forged requests. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (remote), requires low privileges (subscriber role), does not require user interaction, and impacts integrity but not confidentiality or availability. No known exploits have been reported in the wild, and no official patches or updates have been linked, though version 1.0.5 is noted as the fixed version. The vulnerability affects the Product Stock Manager plugin, which is used to manage inventory and stock details on WordPress sites, typically for e-commerce or retail-related websites. Exploitation could lead to unauthorized changes in stock data or site options, potentially disrupting business operations or enabling further attacks through misconfiguration.
Potential Impact
For European organizations, especially those operating e-commerce platforms or retail websites using WordPress with the Product Stock Manager plugin, this vulnerability poses a moderate risk. Unauthorized modification of plugin options could lead to inaccurate stock information, affecting sales, customer trust, and inventory management. More critically, if attackers manipulate site options, they might create conditions for privilege escalation, site defacement, or insertion of malicious code, thereby compromising the integrity of the website. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise can indirectly affect business continuity and reputation. Given the widespread use of WordPress in Europe and the importance of e-commerce in the region, organizations relying on this plugin without timely updates may face operational disruptions. The absence of known exploits reduces immediate risk, but the low privilege required and lack of user interaction make it a plausible target for opportunistic attackers. Additionally, the vulnerability could be leveraged as a foothold for more sophisticated attacks within compromised environments.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately verify if the Product Stock Manager plugin is installed and identify the version in use. 2) Upgrade the plugin to version 1.0.5 or later, where the authorization and CSRF checks have been properly implemented. If an official patch is unavailable, consider disabling or removing the plugin until a secure version is released. 3) Restrict user roles and permissions rigorously, ensuring that subscriber accounts cannot access administrative or sensitive AJAX endpoints. 4) Implement Web Application Firewall (WAF) rules to monitor and block suspicious AJAX requests that attempt to modify options or perform unauthorized actions. 5) Conduct regular audits of WordPress user accounts and plugin configurations to detect unauthorized changes. 6) Employ security plugins that add additional authorization layers and CSRF protections for AJAX actions. 7) Monitor logs for unusual activity related to AJAX calls or option updates, especially from low-privilege accounts. 8) Educate site administrators about the risks of installing plugins from unverified sources and the importance of timely updates. These measures go beyond generic advice by focusing on role-based access control, monitoring AJAX endpoints, and leveraging WAF capabilities tailored to WordPress environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec298
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 6/25/2025, 11:57:32 PM
Last updated: 8/13/2025, 6:21:36 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.