CVE-2025-13924: CWE-352 Cross-Site Request Forgery (CSRF) in maartenbelmans Advanced Product Fields (Product Addons) for WooCommerce
The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.17. This is due to missing or incorrect nonce validation on the 'maybe_duplicate' function. This makes it possible for unauthenticated attackers to duplicate and publish product field groups, including draft and pending field groups, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-13924. This vulnerability exists in all versions up to and including 1.6.17 due to missing or incorrect nonce validation in the 'maybe_duplicate' function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce checks allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), causes the duplication and publication of product field groups, including those in draft or pending states. This unauthorized action can alter the configuration of product addons, potentially leading to inconsistent product data or enabling further exploitation through manipulated product fields. The attack vector requires no authentication by the attacker but depends on social engineering to induce an administrator to perform the action, thus involving user interaction. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it affect system availability. The CVSS 3.1 base score is 4.3, reflecting a medium severity level with network attack vector, low attack complexity, no privileges required, but user interaction needed. No patches or known exploits have been reported at the time of publication. The vulnerability was assigned by Wordfence and publicly disclosed on December 9, 2025.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms using the affected Advanced Product Fields plugin, this vulnerability poses a risk of unauthorized modification of product field configurations. While it does not directly compromise customer data confidentiality or system availability, unauthorized duplication and publication of product field groups can disrupt product presentation, pricing, or options, potentially leading to customer confusion, loss of sales, or reputational damage. Additionally, manipulated product fields could be leveraged as a foothold for further attacks, such as injecting malicious scripts or misleading customers. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in organizations with large or distributed admin teams. Given the widespread use of WooCommerce in Europe, particularly in countries with mature e-commerce markets, the impact could be significant if exploited at scale. The absence of known exploits reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
1. Monitor the plugin vendor’s official channels for a security patch and apply updates promptly once available. 2. Until a patch is released, implement custom nonce validation on the 'maybe_duplicate' function by modifying the plugin code or using WordPress hooks to enforce nonce checks on all state-changing requests. 3. Restrict administrative access to trusted personnel and enforce multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 4. Educate administrators about the risks of clicking unsolicited links and implement email filtering to reduce phishing attempts. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the affected endpoints. 6. Regularly audit product field configurations and logs for unauthorized changes to detect potential exploitation early. 7. Consider isolating or limiting the use of the affected plugin if immediate patching is not feasible, or temporarily disabling the 'maybe_duplicate' functionality if possible.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13924: CWE-352 Cross-Site Request Forgery (CSRF) in maartenbelmans Advanced Product Fields (Product Addons) for WooCommerce
Description
The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.17. This is due to missing or incorrect nonce validation on the 'maybe_duplicate' function. This makes it possible for unauthenticated attackers to duplicate and publish product field groups, including draft and pending field groups, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-13924. This vulnerability exists in all versions up to and including 1.6.17 due to missing or incorrect nonce validation in the 'maybe_duplicate' function. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. The absence or improper implementation of nonce checks allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), causes the duplication and publication of product field groups, including those in draft or pending states. This unauthorized action can alter the configuration of product addons, potentially leading to inconsistent product data or enabling further exploitation through manipulated product fields. The attack vector requires no authentication by the attacker but depends on social engineering to induce an administrator to perform the action, thus involving user interaction. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it affect system availability. The CVSS 3.1 base score is 4.3, reflecting a medium severity level with network attack vector, low attack complexity, no privileges required, but user interaction needed. No patches or known exploits have been reported at the time of publication. The vulnerability was assigned by Wordfence and publicly disclosed on December 9, 2025.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms using the affected Advanced Product Fields plugin, this vulnerability poses a risk of unauthorized modification of product field configurations. While it does not directly compromise customer data confidentiality or system availability, unauthorized duplication and publication of product field groups can disrupt product presentation, pricing, or options, potentially leading to customer confusion, loss of sales, or reputational damage. Additionally, manipulated product fields could be leveraged as a foothold for further attacks, such as injecting malicious scripts or misleading customers. The requirement for administrator interaction limits the attack scope but does not eliminate risk, especially in organizations with large or distributed admin teams. Given the widespread use of WooCommerce in Europe, particularly in countries with mature e-commerce markets, the impact could be significant if exploited at scale. The absence of known exploits reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
1. Monitor the plugin vendor’s official channels for a security patch and apply updates promptly once available. 2. Until a patch is released, implement custom nonce validation on the 'maybe_duplicate' function by modifying the plugin code or using WordPress hooks to enforce nonce checks on all state-changing requests. 3. Restrict administrative access to trusted personnel and enforce multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 4. Educate administrators about the risks of clicking unsolicited links and implement email filtering to reduce phishing attempts. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the affected endpoints. 6. Regularly audit product field configurations and logs for unauthorized changes to detect potential exploitation early. 7. Consider isolating or limiting the use of the affected plugin if immediate patching is not feasible, or temporarily disabling the 'maybe_duplicate' functionality if possible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T20:51:17.716Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4c74ebaa3baba14004
Added to database: 12/9/2025, 5:37:16 PM
Last enriched: 12/9/2025, 5:53:00 PM
Last updated: 12/11/2025, 2:27:21 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.