Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13606: CWE-352 Cross-Site Request Forgery (CSRF) in smackcoders Export All Posts, Products, Orders, Refunds & Users

0
Medium
VulnerabilityCVE-2025-13606cvecve-2025-13606cwe-352
Published: Tue Dec 02 2025 (12/02/2025, 04:37:14 UTC)
Source: CVE Database V5
Vendor/Project: smackcoders
Product: Export All Posts, Products, Orders, Refunds & Users

Description

The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.19. This is due to missing or incorrect nonce validation on the `parseData` function. This makes it possible for unauthenticated attackers to export sensitive information including user data, email addresses, password hashes, and WooCommerce data to an attacker-controlled file path on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/09/2025, 05:31:44 UTC

Technical Analysis

CVE-2025-13606 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Export All Posts, Products, Orders, Refunds & Users' developed by smackcoders. This plugin facilitates exporting various types of site data, including posts, products, orders, refunds, and user information. The vulnerability exists due to missing or incorrect nonce validation in the parseData function, which is intended to protect against unauthorized requests. Because of this flaw, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), triggers the export of sensitive data. The data exposed includes user personal information, email addresses, password hashes, and WooCommerce transactional data, which can be saved to an attacker-controlled file path on the server. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making it a targeted social engineering vector. The CVSS 3.1 score of 6.5 reflects the ease of network exploitation (no privileges required) combined with the high confidentiality impact due to sensitive data exposure. However, the vulnerability does not affect data integrity or availability. No patches or exploits are currently publicly available, but the risk remains significant for sites using this plugin, especially those handling e-commerce data. The vulnerability is classified under CWE-352, emphasizing the importance of proper nonce validation to prevent CSRF attacks.

Potential Impact

For European organizations, particularly those operating WordPress sites with WooCommerce integration, this vulnerability poses a significant risk of sensitive data leakage. Exposure of user data, including password hashes and personal information, can lead to identity theft, credential stuffing attacks, and regulatory non-compliance issues under GDPR. The unauthorized export of transactional and order data can also compromise customer privacy and business confidentiality. Since the attack requires an administrator to be tricked into clicking a malicious link, organizations with less stringent user awareness training or those with administrators frequently accessing untrusted content are at higher risk. The breach of confidentiality could result in reputational damage, financial penalties, and loss of customer trust. Given the widespread use of WordPress and WooCommerce in Europe, the scope of affected systems is substantial. However, the lack of impact on integrity and availability limits the threat to data exposure rather than service disruption.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the vulnerable 'Export All Posts, Products, Orders, Refunds & Users' plugin. Until an official patch is released, administrators should restrict access to the plugin's export functionality by limiting administrator exposure to untrusted websites and emails to reduce the risk of social engineering. Implementing web application firewalls (WAF) with CSRF protection rules can help detect and block forged requests targeting the vulnerable endpoint. Site owners can also manually add nonce validation or verify existing nonce implementations in the plugin's code if feasible. Regular backups and monitoring of export activity logs can help detect suspicious data export attempts. Additionally, educating administrators on the risks of clicking unknown links and enforcing multi-factor authentication can reduce the likelihood of successful exploitation. Once a patch is available, prompt updating of the plugin is critical. Finally, reviewing and minimizing the number of administrators with export privileges can reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T14:50:42.137Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e6edbf8429d84f3bf2bb2

Added to database: 12/2/2025, 4:45:15 AM

Last enriched: 12/9/2025, 5:31:44 AM

Last updated: 1/18/2026, 10:43:17 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats