CVE-2025-12130: CWE-352 Cross-Site Request Forgery (CSRF) in wcvendors WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, Product Vendors
The WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, Product Vendors plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.4. This is due to missing or incorrect nonce validation on the /vendor_dashboard/product/delete/ endpoint. This makes it possible for unauthenticated attackers to delete vendor products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-12130 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, and Product Vendors plugin for WordPress, affecting all versions up to and including 2.6.4. The vulnerability stems from missing or incorrect nonce validation on the /vendor_dashboard/product/delete/ endpoint, which is responsible for handling product deletion requests from vendors. Nonces are security tokens used to verify that requests originate from legitimate users and prevent unauthorized actions. Due to the absence or misconfiguration of nonce checks, an attacker can craft a malicious web request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), causes the deletion of vendor products without the administrator's explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making social engineering a key component of exploitation. The vulnerability impacts the integrity of vendor product data by enabling unauthorized deletions, potentially causing business disruption and loss of vendor trust. The CVSS 3.1 score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction, and limited impact confined to integrity without affecting confidentiality or availability. No public exploits have been reported, but the vulnerability is publicly disclosed and documented. The affected plugin is widely used in WordPress-based e-commerce marketplaces, making the vulnerability relevant to organizations relying on these platforms for multivendor operations.
Potential Impact
For European organizations operating e-commerce marketplaces using the WC Vendors plugin, this vulnerability poses a risk of unauthorized deletion of vendor products, which can lead to significant operational disruptions, loss of sales, and damage to vendor relationships. The integrity of product listings is critical for marketplace trust and revenue; unauthorized deletions can undermine customer confidence and vendor participation. While the vulnerability does not expose confidential data or cause denial of service, the ability to manipulate product data without authentication can facilitate further social engineering or targeted attacks against marketplace administrators. Given the reliance on WooCommerce in Europe, particularly in countries with mature e-commerce sectors, the impact could be widespread if exploited at scale. Additionally, the need for user interaction means attackers may attempt phishing or other social engineering campaigns targeting administrators, increasing the risk profile. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the WC Vendors plugin developers as soon as they are released to address nonce validation issues. 2. In the absence of an immediate patch, implement custom nonce validation on the /vendor_dashboard/product/delete/ endpoint by modifying plugin code or using WordPress hooks to enforce proper request verification. 3. Educate site administrators and privileged users about the risks of clicking unsolicited links or visiting untrusted websites to reduce the risk of social engineering exploitation. 4. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious CSRF attempts targeting the vulnerable endpoint. 5. Regularly audit and monitor product deletion logs and vendor dashboards for unusual activity that may indicate exploitation attempts. 6. Restrict administrative access to trusted networks or VPNs to reduce exposure to external CSRF attacks. 7. Encourage the use of multi-factor authentication (MFA) for administrator accounts to add an additional layer of security against account compromise that could facilitate exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-12130: CWE-352 Cross-Site Request Forgery (CSRF) in wcvendors WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, Product Vendors
Description
The WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, Product Vendors plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.4. This is due to missing or incorrect nonce validation on the /vendor_dashboard/product/delete/ endpoint. This makes it possible for unauthenticated attackers to delete vendor products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-12130 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the WC Vendors – WooCommerce Multivendor, WooCommerce Marketplace, and Product Vendors plugin for WordPress, affecting all versions up to and including 2.6.4. The vulnerability stems from missing or incorrect nonce validation on the /vendor_dashboard/product/delete/ endpoint, which is responsible for handling product deletion requests from vendors. Nonces are security tokens used to verify that requests originate from legitimate users and prevent unauthorized actions. Due to the absence or misconfiguration of nonce checks, an attacker can craft a malicious web request that, when executed by an authenticated site administrator (e.g., by clicking a specially crafted link), causes the deletion of vendor products without the administrator's explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making social engineering a key component of exploitation. The vulnerability impacts the integrity of vendor product data by enabling unauthorized deletions, potentially causing business disruption and loss of vendor trust. The CVSS 3.1 score of 4.3 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction, and limited impact confined to integrity without affecting confidentiality or availability. No public exploits have been reported, but the vulnerability is publicly disclosed and documented. The affected plugin is widely used in WordPress-based e-commerce marketplaces, making the vulnerability relevant to organizations relying on these platforms for multivendor operations.
Potential Impact
For European organizations operating e-commerce marketplaces using the WC Vendors plugin, this vulnerability poses a risk of unauthorized deletion of vendor products, which can lead to significant operational disruptions, loss of sales, and damage to vendor relationships. The integrity of product listings is critical for marketplace trust and revenue; unauthorized deletions can undermine customer confidence and vendor participation. While the vulnerability does not expose confidential data or cause denial of service, the ability to manipulate product data without authentication can facilitate further social engineering or targeted attacks against marketplace administrators. Given the reliance on WooCommerce in Europe, particularly in countries with mature e-commerce sectors, the impact could be widespread if exploited at scale. Additionally, the need for user interaction means attackers may attempt phishing or other social engineering campaigns targeting administrators, increasing the risk profile. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the WC Vendors plugin developers as soon as they are released to address nonce validation issues. 2. In the absence of an immediate patch, implement custom nonce validation on the /vendor_dashboard/product/delete/ endpoint by modifying plugin code or using WordPress hooks to enforce proper request verification. 3. Educate site administrators and privileged users about the risks of clicking unsolicited links or visiting untrusted websites to reduce the risk of social engineering exploitation. 4. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious CSRF attempts targeting the vulnerable endpoint. 5. Regularly audit and monitor product deletion logs and vendor dashboards for unusual activity that may indicate exploitation attempts. 6. Restrict administrative access to trusted networks or VPNs to reduce exposure to external CSRF attacks. 7. Encourage the use of multi-factor authentication (MFA) for administrator accounts to add an additional layer of security against account compromise that could facilitate exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T18:51:55.361Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69328da7f88dbe026c81c65a
Added to database: 12/5/2025, 7:45:43 AM
Last enriched: 12/12/2025, 8:24:51 AM
Last updated: 1/19/2026, 8:42:26 PM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan
MediumCVE-2026-1174: Resource Consumption in birkir prime
MediumCVE-2026-23837: CWE-863: Incorrect Authorization in franklioxygen MyTube
CriticalCVE-2026-23851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighCVE-2026-23850: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.