Skip to main content

CVE-2023-3547: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown All in One B2B for WooCommerce

High
Published: Mon Sep 25 2023 (09/25/2023, 15:56:55 UTC)
Source: CVE
Vendor/Project: Unknown
Product: All in One B2B for WooCommerce

Description

The All in One B2B for WooCommerce WordPress plugin through 1.0.3 does not properly check nonce values in several actions, allowing an attacker to perform CSRF attacks.

AI-Powered Analysis

AILast updated: 06/21/2025, 22:13:43 UTC

Technical Analysis

CVE-2023-3547 is a high-severity vulnerability affecting the All in One B2B for WooCommerce WordPress plugin, specifically versions up to 1.0.3. The vulnerability stems from improper verification of nonce values in several plugin actions, which results in a Cross-Site Request Forgery (CSRF) weakness (CWE-352). Nonces in WordPress are security tokens used to validate that requests originate from legitimate users and not from malicious third-party sites. The lack of proper nonce validation means that an attacker can craft malicious web requests that, when executed by an authenticated user, perform unauthorized actions on their behalf without their consent. This vulnerability allows remote attackers to exploit the plugin via a network vector (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The impact is significant, as the CVSS 3.1 base score of 8.8 indicates high confidentiality, integrity, and availability impacts (C:H/I:H/A:H). Successful exploitation could lead to unauthorized changes in B2B configurations, manipulation of user roles, or other critical business logic alterations within WooCommerce stores that use this plugin. Although no known exploits are currently reported in the wild, the plugin’s widespread use in e-commerce environments makes this a critical issue to address promptly.

Potential Impact

For European organizations, the impact of this vulnerability is considerable, especially for those relying on WooCommerce with the All in One B2B plugin to manage B2B customer interactions and pricing. Exploitation could lead to unauthorized transactions, data manipulation, or disruption of business operations, potentially causing financial loss, reputational damage, and regulatory compliance issues under GDPR due to unauthorized access or modification of customer data. Given the high integrity and availability impact, attackers could disrupt order processing or alter pricing and user permissions, leading to operational downtime or fraudulent activities. This is particularly critical for SMEs and large enterprises in sectors such as retail, manufacturing, and wholesale distribution that depend heavily on WooCommerce for their e-commerce infrastructure. The requirement for user interaction means phishing or social engineering campaigns could be used to trick legitimate users into triggering the malicious requests, increasing the attack surface.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately update the All in One B2B for WooCommerce plugin to a patched version once available; if no patch exists, consider temporarily disabling the plugin or restricting its use to trusted administrators only. 2) Implement Web Application Firewall (WAF) rules that detect and block suspicious POST requests lacking valid nonce tokens or originating from untrusted referrers. 3) Educate users and administrators about the risks of CSRF and the importance of not clicking on suspicious links or executing unknown actions while logged into the WooCommerce admin panel. 4) Employ Content Security Policy (CSP) headers to restrict the domains that can execute scripts or send requests to the WooCommerce site, reducing the risk of CSRF exploitation via malicious third-party sites. 5) Monitor logs for unusual activity patterns, such as unexpected changes in B2B configurations or user roles, which could indicate exploitation attempts. 6) Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of session hijacking or unauthorized access that could facilitate CSRF attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-07-07T17:30:38.839Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf512e

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/21/2025, 10:13:43 PM

Last updated: 8/11/2025, 3:06:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats