CVE-2025-12358: CWE-352 Cross-Site Request Forgery (CSRF) in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
CVE-2025-12358 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 4. 8. 5 of the ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress. The flaw arises from missing nonce validation and improper permissions callbacks, allowing unauthenticated attackers to trick users into adding or removing products from their wishlist via forged requests. Exploitation requires user interaction, such as clicking a malicious link, but does not impact confidentiality or availability. While no known exploits are currently in the wild, the vulnerability could be leveraged for user manipulation or nuisance attacks. European organizations using this WooCommerce addon should prioritize patching or applying mitigations to prevent unauthorized wishlist modifications. Countries with high WordPress and WooCommerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation involves updating the plugin once a patch is available, implementing strict nonce validation, and educating users about phishing risks. Given the ease of exploitation and limited impact scope, the severity is medium.
AI Analysis
Technical Summary
The ShopEngine Elementor WooCommerce Builder Addon plugin, widely used in WordPress e-commerce sites, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-12358. This vulnerability exists in all versions up to and including 4.8.5 due to two main issues: the absence of nonce validation in the "post_add_to_list" function and an incorrect permissions callback in the "Api/init" function. Nonce validation is a security mechanism designed to ensure that requests originate from legitimate users and not from malicious third-party sites. Without this validation, attackers can craft malicious web pages or emails that, when visited or clicked by an authenticated user, cause unintended actions on the vulnerable site. Specifically, attackers can add or remove products from a user's wishlist without their consent. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as clicking a link. The CVSS v3.1 score is 4.3 (medium), reflecting limited impact on confidentiality (none) and availability (none), but some impact on integrity (wishlist manipulation). No known exploits have been reported in the wild yet. The vulnerability's root cause is improper implementation of security controls in the plugin's API endpoints, which should enforce nonce checks and proper permission callbacks to prevent unauthorized requests. This flaw can be exploited remotely over the network (AV:N) without elevated privileges, making it accessible to a wide range of attackers if users are tricked into interaction.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns user trust and potential manipulation of e-commerce user experience. While it does not expose sensitive data or disrupt service availability, unauthorized modification of wishlists can lead to customer dissatisfaction, potential loss of sales, and reputational damage. Attackers might exploit this vulnerability to manipulate product popularity metrics or create confusion among users, indirectly affecting business analytics and marketing strategies. Since WooCommerce is a popular e-commerce platform in Europe, especially in countries with strong online retail sectors, organizations relying on the ShopEngine Elementor WooCommerce Builder Addon are at risk. The vulnerability could also be leveraged as a stepping stone in more complex social engineering or phishing campaigns targeting customers. However, the lack of direct data breach or service disruption limits the severity of the impact. Nonetheless, the presence of such a vulnerability undermines the overall security posture of affected e-commerce sites and could invite further scrutiny from regulators under GDPR if user trust is compromised.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they use the ShopEngine Elementor WooCommerce Builder Addon plugin and identify the version deployed. Since no official patch links are currently available, organizations should monitor the vendor's announcements for updates addressing nonce validation and permissions callback issues. In the interim, administrators can implement custom nonce validation checks on the affected API endpoints to block unauthorized requests. Additionally, applying Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts can reduce risk. Educating users about the dangers of clicking unsolicited links and implementing Content Security Policy (CSP) headers to restrict cross-origin requests can further mitigate exploitation vectors. Regularly auditing plugin permissions and restricting API access to authenticated and authorized users will help prevent unauthorized actions. Finally, organizations should consider alternative plugins with stronger security postures if timely patches are not forthcoming.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12358: CWE-352 Cross-Site Request Forgery (CSRF) in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
Description
CVE-2025-12358 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 4. 8. 5 of the ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress. The flaw arises from missing nonce validation and improper permissions callbacks, allowing unauthenticated attackers to trick users into adding or removing products from their wishlist via forged requests. Exploitation requires user interaction, such as clicking a malicious link, but does not impact confidentiality or availability. While no known exploits are currently in the wild, the vulnerability could be leveraged for user manipulation or nuisance attacks. European organizations using this WooCommerce addon should prioritize patching or applying mitigations to prevent unauthorized wishlist modifications. Countries with high WordPress and WooCommerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation involves updating the plugin once a patch is available, implementing strict nonce validation, and educating users about phishing risks. Given the ease of exploitation and limited impact scope, the severity is medium.
AI-Powered Analysis
Technical Analysis
The ShopEngine Elementor WooCommerce Builder Addon plugin, widely used in WordPress e-commerce sites, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-12358. This vulnerability exists in all versions up to and including 4.8.5 due to two main issues: the absence of nonce validation in the "post_add_to_list" function and an incorrect permissions callback in the "Api/init" function. Nonce validation is a security mechanism designed to ensure that requests originate from legitimate users and not from malicious third-party sites. Without this validation, attackers can craft malicious web pages or emails that, when visited or clicked by an authenticated user, cause unintended actions on the vulnerable site. Specifically, attackers can add or remove products from a user's wishlist without their consent. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as clicking a link. The CVSS v3.1 score is 4.3 (medium), reflecting limited impact on confidentiality (none) and availability (none), but some impact on integrity (wishlist manipulation). No known exploits have been reported in the wild yet. The vulnerability's root cause is improper implementation of security controls in the plugin's API endpoints, which should enforce nonce checks and proper permission callbacks to prevent unauthorized requests. This flaw can be exploited remotely over the network (AV:N) without elevated privileges, making it accessible to a wide range of attackers if users are tricked into interaction.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns user trust and potential manipulation of e-commerce user experience. While it does not expose sensitive data or disrupt service availability, unauthorized modification of wishlists can lead to customer dissatisfaction, potential loss of sales, and reputational damage. Attackers might exploit this vulnerability to manipulate product popularity metrics or create confusion among users, indirectly affecting business analytics and marketing strategies. Since WooCommerce is a popular e-commerce platform in Europe, especially in countries with strong online retail sectors, organizations relying on the ShopEngine Elementor WooCommerce Builder Addon are at risk. The vulnerability could also be leveraged as a stepping stone in more complex social engineering or phishing campaigns targeting customers. However, the lack of direct data breach or service disruption limits the severity of the impact. Nonetheless, the presence of such a vulnerability undermines the overall security posture of affected e-commerce sites and could invite further scrutiny from regulators under GDPR if user trust is compromised.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if they use the ShopEngine Elementor WooCommerce Builder Addon plugin and identify the version deployed. Since no official patch links are currently available, organizations should monitor the vendor's announcements for updates addressing nonce validation and permissions callback issues. In the interim, administrators can implement custom nonce validation checks on the affected API endpoints to block unauthorized requests. Additionally, applying Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts can reduce risk. Educating users about the dangers of clicking unsolicited links and implementing Content Security Policy (CSP) headers to restrict cross-origin requests can further mitigate exploitation vectors. Regularly auditing plugin permissions and restricting API access to authenticated and authorized users will help prevent unauthorized actions. Finally, organizations should consider alternative plugins with stronger security postures if timely patches are not forthcoming.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T16:10:11.719Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69302ef1720cedca79452379
Added to database: 12/3/2025, 12:37:05 PM
Last enriched: 12/10/2025, 1:44:59 PM
Last updated: 1/17/2026, 8:50:03 AM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalFive Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.