Skip to main content

CVE-2022-3451: CWE-862 Missing Authorization in Unknown Product Stock Manager

Medium
VulnerabilityCVE-2022-3451cvecve-2022-3451cwe-862cwe-352
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Product Stock Manager

Description

The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options

AI-Powered Analysis

AILast updated: 06/25/2025, 23:57:32 UTC

Technical Analysis

CVE-2022-3451 is a security vulnerability identified in the Product Stock Manager WordPress plugin versions prior to 1.0.5. The core issue is a lack of proper authorization and Cross-Site Request Forgery (CSRF) protections in multiple AJAX actions exposed by the plugin. Specifically, users with the minimal WordPress role of 'subscriber'—which is typically assigned to unprivileged users—can invoke these AJAX actions without sufficient permission checks. One critical action allows such users to update arbitrary options within the WordPress environment. This means that an attacker with a low-privilege account can manipulate plugin or site settings, potentially altering the behavior or configuration of the website. The vulnerability stems from CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery), indicating that the plugin fails to verify whether the requesting user is authorized to perform the requested actions and does not protect against forged requests. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (remote), requires low privileges (subscriber role), does not require user interaction, and impacts integrity but not confidentiality or availability. No known exploits have been reported in the wild, and no official patches or updates have been linked, though version 1.0.5 is noted as the fixed version. The vulnerability affects the Product Stock Manager plugin, which is used to manage inventory and stock details on WordPress sites, typically for e-commerce or retail-related websites. Exploitation could lead to unauthorized changes in stock data or site options, potentially disrupting business operations or enabling further attacks through misconfiguration.

Potential Impact

For European organizations, especially those operating e-commerce platforms or retail websites using WordPress with the Product Stock Manager plugin, this vulnerability poses a moderate risk. Unauthorized modification of plugin options could lead to inaccurate stock information, affecting sales, customer trust, and inventory management. More critically, if attackers manipulate site options, they might create conditions for privilege escalation, site defacement, or insertion of malicious code, thereby compromising the integrity of the website. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise can indirectly affect business continuity and reputation. Given the widespread use of WordPress in Europe and the importance of e-commerce in the region, organizations relying on this plugin without timely updates may face operational disruptions. The absence of known exploits reduces immediate risk, but the low privilege required and lack of user interaction make it a plausible target for opportunistic attackers. Additionally, the vulnerability could be leveraged as a foothold for more sophisticated attacks within compromised environments.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately verify if the Product Stock Manager plugin is installed and identify the version in use. 2) Upgrade the plugin to version 1.0.5 or later, where the authorization and CSRF checks have been properly implemented. If an official patch is unavailable, consider disabling or removing the plugin until a secure version is released. 3) Restrict user roles and permissions rigorously, ensuring that subscriber accounts cannot access administrative or sensitive AJAX endpoints. 4) Implement Web Application Firewall (WAF) rules to monitor and block suspicious AJAX requests that attempt to modify options or perform unauthorized actions. 5) Conduct regular audits of WordPress user accounts and plugin configurations to detect unauthorized changes. 6) Employ security plugins that add additional authorization layers and CSRF protections for AJAX actions. 7) Monitor logs for unusual activity related to AJAX calls or option updates, especially from low-privilege accounts. 8) Educate site administrators about the risks of installing plugins from unverified sources and the importance of timely updates. These measures go beyond generic advice by focusing on role-based access control, monitoring AJAX endpoints, and leveraging WAF capabilities tailored to WordPress environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec298

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:57:32 PM

Last updated: 8/13/2025, 6:21:36 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats