Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12375: CWE-918 Server-Side Request Forgery (SSRF) in printful Printful Integration for WooCommerce

0
Medium
VulnerabilityCVE-2025-12375cvecve-2025-12375cwe-918
Published: Thu Feb 19 2026 (02/19/2026, 03:25:14 UTC)
Source: CVE Database V5
Vendor/Project: printful
Product: Printful Integration for WooCommerce

Description

The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 02/19/2026, 04:29:45 UTC

Technical Analysis

CVE-2025-12375 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Printful Integration for WooCommerce plugin for WordPress, affecting all versions up to and including 2.2.11. The vulnerability arises from insufficient validation of user-supplied URLs passed to the download_url() function via the advanced size chart REST API endpoint. This flaw allows authenticated attackers with Contributor-level privileges or higher to craft requests that cause the server to initiate HTTP requests to arbitrary locations. SSRF vulnerabilities are dangerous because they can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive internal services, metadata endpoints, or administrative interfaces. The vulnerability does not require user interaction but does require authentication with at least Contributor-level access, which is a moderately privileged role in WordPress. The CVSS v3.1 base score is 6.4, indicating medium severity, with the vector indicating network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe, making this a relevant threat for European organizations relying on this integration for print-on-demand services.

Potential Impact

For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance and data access, potentially exposing sensitive business information or internal APIs. Attackers could manipulate internal services or retrieve confidential data, undermining confidentiality and integrity. Given the e-commerce focus of WooCommerce and Printful Integration, compromised sites could suffer reputational damage, loss of customer trust, and regulatory consequences under GDPR if personal data is exposed. The requirement for Contributor-level authentication limits the attack surface but does not eliminate risk, especially in environments with multiple users or less restrictive access controls. The vulnerability could also be leveraged as a pivot point for further internal network attacks. The lack of known exploits reduces immediate risk but does not preclude targeted attacks, especially against high-value European e-commerce businesses. The impact on availability is minimal, but the confidentiality and integrity impacts warrant attention.

Mitigation Recommendations

1. Immediately audit and restrict user roles and permissions in WordPress, ensuring that only trusted users have Contributor-level or higher access. 2. Implement strict input validation and sanitization for URLs in any custom or third-party plugins, including Printful Integration, to prevent SSRF. 3. Monitor and log outgoing HTTP requests from the web server to detect anomalous or unauthorized internal requests. 4. Employ network segmentation and firewall rules to limit the web server's ability to access sensitive internal services and metadata endpoints. 5. Apply security updates and patches from the plugin vendor as soon as they become available. 6. Consider disabling or restricting the advanced size chart REST API endpoint if it is not essential to business operations. 7. Use Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests. 8. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications. These steps go beyond generic advice by focusing on role management, network controls, and monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T22:10:07.660Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69968d636aea4a407a3900d9

Added to database: 2/19/2026, 4:11:15 AM

Last enriched: 2/19/2026, 4:29:45 AM

Last updated: 2/21/2026, 12:16:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats