CVE-2025-13606: CWE-352 Cross-Site Request Forgery (CSRF) in smackcoders Export All Posts, Products, Orders, Refunds & Users
The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.19. This is due to missing or incorrect nonce validation on the `parseData` function. This makes it possible for unauthenticated attackers to export sensitive information including user data, email addresses, password hashes, and WooCommerce data to an attacker-controlled file path on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13606 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Export All Posts, Products, Orders, Refunds & Users' developed by smackcoders. This plugin facilitates exporting various types of site data, including posts, products, orders, refunds, and user information. The vulnerability exists due to missing or incorrect nonce validation in the parseData function, which is intended to protect against unauthorized requests. Because of this flaw, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), triggers the export of sensitive data. The data exposed includes user personal information, email addresses, password hashes, and WooCommerce transactional data, which can be saved to an attacker-controlled file path on the server. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making it a targeted social engineering vector. The CVSS 3.1 score of 6.5 reflects the ease of network exploitation (no privileges required) combined with the high confidentiality impact due to sensitive data exposure. However, the vulnerability does not affect data integrity or availability. No patches or exploits are currently publicly available, but the risk remains significant for sites using this plugin, especially those handling e-commerce data. The vulnerability is classified under CWE-352, emphasizing the importance of proper nonce validation to prevent CSRF attacks.
Potential Impact
For European organizations, particularly those operating WordPress sites with WooCommerce integration, this vulnerability poses a significant risk of sensitive data leakage. Exposure of user data, including password hashes and personal information, can lead to identity theft, credential stuffing attacks, and regulatory non-compliance issues under GDPR. The unauthorized export of transactional and order data can also compromise customer privacy and business confidentiality. Since the attack requires an administrator to be tricked into clicking a malicious link, organizations with less stringent user awareness training or those with administrators frequently accessing untrusted content are at higher risk. The breach of confidentiality could result in reputational damage, financial penalties, and loss of customer trust. Given the widespread use of WordPress and WooCommerce in Europe, the scope of affected systems is substantial. However, the lack of impact on integrity and availability limits the threat to data exposure rather than service disruption.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the vulnerable 'Export All Posts, Products, Orders, Refunds & Users' plugin. Until an official patch is released, administrators should restrict access to the plugin's export functionality by limiting administrator exposure to untrusted websites and emails to reduce the risk of social engineering. Implementing web application firewalls (WAF) with CSRF protection rules can help detect and block forged requests targeting the vulnerable endpoint. Site owners can also manually add nonce validation or verify existing nonce implementations in the plugin's code if feasible. Regular backups and monitoring of export activity logs can help detect suspicious data export attempts. Additionally, educating administrators on the risks of clicking unknown links and enforcing multi-factor authentication can reduce the likelihood of successful exploitation. Once a patch is available, prompt updating of the plugin is critical. Finally, reviewing and minimizing the number of administrators with export privileges can reduce the attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13606: CWE-352 Cross-Site Request Forgery (CSRF) in smackcoders Export All Posts, Products, Orders, Refunds & Users
Description
The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.19. This is due to missing or incorrect nonce validation on the `parseData` function. This makes it possible for unauthenticated attackers to export sensitive information including user data, email addresses, password hashes, and WooCommerce data to an attacker-controlled file path on the server via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-13606 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'Export All Posts, Products, Orders, Refunds & Users' developed by smackcoders. This plugin facilitates exporting various types of site data, including posts, products, orders, refunds, and user information. The vulnerability exists due to missing or incorrect nonce validation in the parseData function, which is intended to protect against unauthorized requests. Because of this flaw, an attacker can craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), triggers the export of sensitive data. The data exposed includes user personal information, email addresses, password hashes, and WooCommerce transactional data, which can be saved to an attacker-controlled file path on the server. The attack does not require the attacker to be authenticated but does require user interaction from an administrator, making it a targeted social engineering vector. The CVSS 3.1 score of 6.5 reflects the ease of network exploitation (no privileges required) combined with the high confidentiality impact due to sensitive data exposure. However, the vulnerability does not affect data integrity or availability. No patches or exploits are currently publicly available, but the risk remains significant for sites using this plugin, especially those handling e-commerce data. The vulnerability is classified under CWE-352, emphasizing the importance of proper nonce validation to prevent CSRF attacks.
Potential Impact
For European organizations, particularly those operating WordPress sites with WooCommerce integration, this vulnerability poses a significant risk of sensitive data leakage. Exposure of user data, including password hashes and personal information, can lead to identity theft, credential stuffing attacks, and regulatory non-compliance issues under GDPR. The unauthorized export of transactional and order data can also compromise customer privacy and business confidentiality. Since the attack requires an administrator to be tricked into clicking a malicious link, organizations with less stringent user awareness training or those with administrators frequently accessing untrusted content are at higher risk. The breach of confidentiality could result in reputational damage, financial penalties, and loss of customer trust. Given the widespread use of WordPress and WooCommerce in Europe, the scope of affected systems is substantial. However, the lack of impact on integrity and availability limits the threat to data exposure rather than service disruption.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the vulnerable 'Export All Posts, Products, Orders, Refunds & Users' plugin. Until an official patch is released, administrators should restrict access to the plugin's export functionality by limiting administrator exposure to untrusted websites and emails to reduce the risk of social engineering. Implementing web application firewalls (WAF) with CSRF protection rules can help detect and block forged requests targeting the vulnerable endpoint. Site owners can also manually add nonce validation or verify existing nonce implementations in the plugin's code if feasible. Regular backups and monitoring of export activity logs can help detect suspicious data export attempts. Additionally, educating administrators on the risks of clicking unknown links and enforcing multi-factor authentication can reduce the likelihood of successful exploitation. Once a patch is available, prompt updating of the plugin is critical. Finally, reviewing and minimizing the number of administrators with export privileges can reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T14:50:42.137Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e6edbf8429d84f3bf2bb2
Added to database: 12/2/2025, 4:45:15 AM
Last enriched: 12/9/2025, 5:31:44 AM
Last updated: 1/18/2026, 10:43:17 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 1Panel-dev 1Panel
MediumCVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.