CVE-2025-12375: CWE-918 Server-Side Request Forgery (SSRF) in printful Printful Integration for WooCommerce
The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-12375 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Printful Integration for WooCommerce plugin for WordPress, affecting all versions up to and including 2.2.11. The vulnerability arises from insufficient validation of user-supplied URLs passed to the download_url() function via the advanced size chart REST API endpoint. This flaw allows authenticated attackers with Contributor-level privileges or higher to craft requests that cause the server to initiate HTTP requests to arbitrary locations. SSRF vulnerabilities are dangerous because they can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive internal services, metadata endpoints, or administrative interfaces. The vulnerability does not require user interaction but does require authentication with at least Contributor-level access, which is a moderately privileged role in WordPress. The CVSS v3.1 base score is 6.4, indicating medium severity, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe, making this a relevant threat for European organizations relying on this integration for print-on-demand services.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance and data access, potentially exposing sensitive business information or internal APIs. Attackers could manipulate internal services or retrieve confidential data, undermining confidentiality and integrity. Given the e-commerce focus of WooCommerce and Printful Integration, compromised sites could suffer reputational damage, loss of customer trust, and regulatory consequences under GDPR if personal data is exposed. The requirement for Contributor-level authentication limits the attack surface but does not eliminate risk, especially in environments with multiple users or less restrictive access controls. The vulnerability could also be leveraged as a pivot point for further internal network attacks. The lack of known exploits reduces immediate risk but does not preclude targeted attacks, especially against high-value European e-commerce businesses. The impact on availability is minimal, but the confidentiality and integrity impacts warrant attention.
Mitigation Recommendations
1. Immediately audit and restrict user roles and permissions in WordPress, ensuring that only trusted users have Contributor-level or higher access. 2. Implement strict input validation and sanitization for URLs in any custom or third-party plugins, including Printful Integration, to prevent SSRF. 3. Monitor and log outgoing HTTP requests from the web server to detect anomalous or unauthorized internal requests. 4. Employ network segmentation and firewall rules to limit the web server's ability to access sensitive internal services and metadata endpoints. 5. Apply security updates and patches from the plugin vendor as soon as they become available. 6. Consider disabling or restricting the advanced size chart REST API endpoint if it is not essential to business operations. 7. Use Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests. 8. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications. These steps go beyond generic advice by focusing on role management, network controls, and monitoring tailored to the specific nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12375: CWE-918 Server-Side Request Forgery (SSRF) in printful Printful Integration for WooCommerce
Description
The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2025-12375 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Printful Integration for WooCommerce plugin for WordPress, affecting all versions up to and including 2.2.11. The vulnerability arises from insufficient validation of user-supplied URLs passed to the download_url() function via the advanced size chart REST API endpoint. This flaw allows authenticated attackers with Contributor-level privileges or higher to craft requests that cause the server to initiate HTTP requests to arbitrary locations. SSRF vulnerabilities are dangerous because they can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive internal services, metadata endpoints, or administrative interfaces. The vulnerability does not require user interaction but does require authentication with at least Contributor-level access, which is a moderately privileged role in WordPress. The CVSS v3.1 base score is 6.4, indicating medium severity, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe, making this a relevant threat for European organizations relying on this integration for print-on-demand services.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance and data access, potentially exposing sensitive business information or internal APIs. Attackers could manipulate internal services or retrieve confidential data, undermining confidentiality and integrity. Given the e-commerce focus of WooCommerce and Printful Integration, compromised sites could suffer reputational damage, loss of customer trust, and regulatory consequences under GDPR if personal data is exposed. The requirement for Contributor-level authentication limits the attack surface but does not eliminate risk, especially in environments with multiple users or less restrictive access controls. The vulnerability could also be leveraged as a pivot point for further internal network attacks. The lack of known exploits reduces immediate risk but does not preclude targeted attacks, especially against high-value European e-commerce businesses. The impact on availability is minimal, but the confidentiality and integrity impacts warrant attention.
Mitigation Recommendations
1. Immediately audit and restrict user roles and permissions in WordPress, ensuring that only trusted users have Contributor-level or higher access. 2. Implement strict input validation and sanitization for URLs in any custom or third-party plugins, including Printful Integration, to prevent SSRF. 3. Monitor and log outgoing HTTP requests from the web server to detect anomalous or unauthorized internal requests. 4. Employ network segmentation and firewall rules to limit the web server's ability to access sensitive internal services and metadata endpoints. 5. Apply security updates and patches from the plugin vendor as soon as they become available. 6. Consider disabling or restricting the advanced size chart REST API endpoint if it is not essential to business operations. 7. Use Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests. 8. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications. These steps go beyond generic advice by focusing on role management, network controls, and monitoring tailored to the specific nature of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T22:10:07.660Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69968d636aea4a407a3900d9
Added to database: 2/19/2026, 4:11:15 AM
Last enriched: 2/19/2026, 4:29:45 AM
Last updated: 2/21/2026, 12:16:40 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.