CVE-2025-12128: CWE-352 Cross-Site Request Forgery (CSRF) in kaushikankrani Hide Categories Or Products On Shop Page
The Hide Categories Or Products On Shop Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the save_data_hcps() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-12128 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Hide Categories Or Products On Shop Page' developed by kaushikankrani. The vulnerability exists in all versions up to and including 1.0.7 due to missing or incorrect nonce validation in the save_data_hcps() function, which handles saving plugin settings. Nonce validation is a security mechanism in WordPress to ensure that requests are legitimate and initiated by authenticated users. The absence of proper nonce checks allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted page), causes unauthorized changes to the plugin's configuration. This attack vector does not require the attacker to be authenticated but does require user interaction from an administrator, making it a classic CSRF scenario. The impact is limited to integrity as attackers can modify plugin settings, potentially altering site behavior or exposing hidden categories/products unintentionally. Confidentiality and availability are not directly affected. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting its medium severity. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may require manual intervention or waiting for an official update. The vulnerability was reserved on 2025-10-23 and published on 2025-12-05 by Wordfence.
Potential Impact
For European organizations, especially those operating e-commerce websites on WordPress using the affected plugin, this vulnerability poses a risk of unauthorized modification of site configuration. Attackers could manipulate which categories or products are hidden or displayed, potentially disrupting sales, misleading customers, or exposing sensitive product information. While the vulnerability does not directly compromise customer data confidentiality or site availability, unauthorized configuration changes can degrade user trust and business reputation. Additionally, altered site behavior might be leveraged in combination with other attacks, such as phishing or social engineering, to further compromise the organization. The requirement for administrator interaction limits the attack scope but does not eliminate risk, particularly in environments with less stringent user security awareness. Given the widespread use of WordPress and e-commerce platforms in Europe, the vulnerability could impact a significant number of small to medium enterprises relying on this plugin for product visibility management.
Mitigation Recommendations
1. Monitor for an official patch or update from the plugin developer and apply it promptly once available. 2. In the interim, implement manual nonce validation in the save_data_hcps() function by adding proper WordPress nonce checks (e.g., using check_admin_referer or wp_verify_nonce) to ensure requests are legitimate. 3. Educate administrators and site managers about the risks of clicking unknown or suspicious links, especially while logged into administrative accounts. 4. Restrict administrative access to trusted networks or use multi-factor authentication to reduce the risk of CSRF exploitation. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the plugin’s endpoints. 6. Regularly audit plugin usage and configuration changes to detect unauthorized modifications quickly. 7. Consider temporarily disabling or replacing the plugin if immediate patching is not feasible and the risk is deemed unacceptable.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12128: CWE-352 Cross-Site Request Forgery (CSRF) in kaushikankrani Hide Categories Or Products On Shop Page
Description
The Hide Categories Or Products On Shop Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the save_data_hcps() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-12128 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Hide Categories Or Products On Shop Page' developed by kaushikankrani. The vulnerability exists in all versions up to and including 1.0.7 due to missing or incorrect nonce validation in the save_data_hcps() function, which handles saving plugin settings. Nonce validation is a security mechanism in WordPress to ensure that requests are legitimate and initiated by authenticated users. The absence of proper nonce checks allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a crafted page), causes unauthorized changes to the plugin's configuration. This attack vector does not require the attacker to be authenticated but does require user interaction from an administrator, making it a classic CSRF scenario. The impact is limited to integrity as attackers can modify plugin settings, potentially altering site behavior or exposing hidden categories/products unintentionally. Confidentiality and availability are not directly affected. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting its medium severity. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may require manual intervention or waiting for an official update. The vulnerability was reserved on 2025-10-23 and published on 2025-12-05 by Wordfence.
Potential Impact
For European organizations, especially those operating e-commerce websites on WordPress using the affected plugin, this vulnerability poses a risk of unauthorized modification of site configuration. Attackers could manipulate which categories or products are hidden or displayed, potentially disrupting sales, misleading customers, or exposing sensitive product information. While the vulnerability does not directly compromise customer data confidentiality or site availability, unauthorized configuration changes can degrade user trust and business reputation. Additionally, altered site behavior might be leveraged in combination with other attacks, such as phishing or social engineering, to further compromise the organization. The requirement for administrator interaction limits the attack scope but does not eliminate risk, particularly in environments with less stringent user security awareness. Given the widespread use of WordPress and e-commerce platforms in Europe, the vulnerability could impact a significant number of small to medium enterprises relying on this plugin for product visibility management.
Mitigation Recommendations
1. Monitor for an official patch or update from the plugin developer and apply it promptly once available. 2. In the interim, implement manual nonce validation in the save_data_hcps() function by adding proper WordPress nonce checks (e.g., using check_admin_referer or wp_verify_nonce) to ensure requests are legitimate. 3. Educate administrators and site managers about the risks of clicking unknown or suspicious links, especially while logged into administrative accounts. 4. Restrict administrative access to trusted networks or use multi-factor authentication to reduce the risk of CSRF exploitation. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the plugin’s endpoints. 6. Regularly audit plugin usage and configuration changes to detect unauthorized modifications quickly. 7. Consider temporarily disabling or replacing the plugin if immediate patching is not feasible and the risk is deemed unacceptable.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T18:37:00.960Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c779905
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/12/2025, 6:07:15 AM
Last updated: 2/4/2026, 11:05:05 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighCVE-2026-1894: Improper Authorization in WeKan
MediumCVE-2025-62616: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2026-25585: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.