Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12358: CWE-352 Cross-Site Request Forgery (CSRF) in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

0
Medium
VulnerabilityCVE-2025-12358cvecve-2025-12358cwe-352
Published: Wed Dec 03 2025 (12/03/2025, 12:29:55 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

Description

The ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.8.5. This is due to missing nonce validation on the "post_add_to_list" function as well as an incorrect permissions callback in the "Api/init" function. This makes it possible for unauthenticated attackers to add or remove products from a user's wishlist via a forged request granted they can trick a site's user into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:23:08 UTC

Technical Analysis

CVE-2025-12358 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability found in the ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress, affecting all versions up to and including 4.8.5. The vulnerability stems from the absence of nonce validation in the 'post_add_to_list' function and an incorrect permissions callback in the 'Api/init' function. Nonce validation is a security mechanism used in WordPress to ensure that requests are intentional and originate from legitimate users. Without it, attackers can craft malicious requests that appear legitimate to the server. The incorrect permissions callback further weakens access control, allowing unauthenticated attackers to exploit the vulnerability. Exploitation requires tricking an authenticated user into performing an action, such as clicking a specially crafted link, which then causes unauthorized modifications to the user's wishlist by adding or removing products. Although the vulnerability does not expose sensitive data (no confidentiality impact) nor disrupt service availability, it compromises the integrity of user data by allowing unauthorized wishlist manipulation. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects that the attack can be performed remotely without privileges but requires user interaction. No public exploits have been reported yet, but the vulnerability poses a risk to e-commerce sites relying on this plugin, potentially undermining user trust and experience. The lack of a patch at the time of reporting necessitates immediate mitigation efforts by site administrators.

Potential Impact

The primary impact of this vulnerability is on the integrity of user data within affected e-commerce websites. Attackers can manipulate users' wishlists without their consent, potentially causing confusion, loss of trust, or indirect financial impact if wishlist data influences purchasing decisions. While the vulnerability does not compromise user credentials or site availability, unauthorized wishlist modifications can degrade user experience and site reputation. For organizations, this could lead to customer dissatisfaction and increased support costs. Since the vulnerability requires user interaction, the attack surface is somewhat limited, but phishing or social engineering campaigns could increase exploitation likelihood. The vulnerability affects all sites using the vulnerable plugin version, which may be widespread given WooCommerce's popularity. The absence of known exploits reduces immediate risk but does not eliminate future exploitation potential. Overall, the impact is moderate but significant enough to warrant prompt remediation to maintain e-commerce platform integrity and user trust.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. In the absence of an official patch, site administrators should implement nonce validation in the 'post_add_to_list' function to ensure requests are legitimate and originate from authenticated users. Additionally, reviewing and correcting the permissions callback in the 'Api/init' function to enforce proper access control is critical. Administrators can also implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the affected endpoints. Educating users about the risks of clicking on untrusted links can reduce the likelihood of successful social engineering. Monitoring logs for unusual wishlist modification patterns may help detect exploitation attempts. Finally, consider temporarily disabling the affected plugin or its vulnerable features if immediate patching is not feasible, balancing business needs and security risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T16:10:11.719Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69302ef1720cedca79452379

Added to database: 12/3/2025, 12:37:05 PM

Last enriched: 2/27/2026, 8:23:08 PM

Last updated: 3/25/2026, 4:33:54 AM

Views: 175

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses