CVE-2025-1913: CWE-502 Deserialization of Untrusted Data in webtoffee Product Import Export for WooCommerce – Import Export Product CSV Suite
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
AI Analysis
Technical Summary
CVE-2025-1913 is a deserialization vulnerability classified under CWE-502 found in the Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress. The vulnerability arises from unsafe deserialization of the 'form_data' parameter, which accepts serialized PHP objects. An attacker with Administrator-level privileges can inject malicious PHP objects through this parameter. However, the vulnerability's exploitability depends on the presence of a Property Oriented Programming (POP) chain in other installed plugins or themes, which can be leveraged to perform malicious actions such as arbitrary file deletion, sensitive data retrieval, or remote code execution. The plugin itself does not contain a POP chain, so the vulnerability is a prerequisite condition rather than a standalone exploit. The CVSS 3.1 score of 7.2 indicates a high severity with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). No known exploits are currently in the wild, but the vulnerability was published on March 26, 2025. The affected versions include all versions up to and including 2.5.0. This vulnerability is particularly relevant for WordPress sites running WooCommerce with this plugin installed alongside other plugins or themes that contain exploitable POP chains.
Potential Impact
For European organizations, this vulnerability poses a significant risk to e-commerce platforms using WooCommerce with the vulnerable plugin. If exploited, attackers could gain the ability to execute arbitrary code, delete critical files, or exfiltrate sensitive customer and business data, leading to data breaches, service disruption, and reputational damage. The requirement for Administrator-level access limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or compromised credentials. The dependency on additional plugins or themes for a POP chain means that organizations with complex WordPress setups are at higher risk. Given the critical role of e-commerce in European markets, successful exploitation could disrupt business operations and violate data protection regulations such as GDPR, resulting in legal and financial consequences.
Mitigation Recommendations
1. Immediately update the Product Import Export for WooCommerce plugin to a patched version once available. 2. Audit all installed plugins and themes for known POP chains or unsafe deserialization patterns; remove or update any that are vulnerable. 3. Restrict Administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication. 4. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious serialized payloads or unusual POST requests targeting the 'form_data' parameter. 5. Regularly monitor logs for anomalous activity related to plugin usage and deserialization attempts. 6. Employ security plugins that can detect and prevent PHP Object Injection attacks. 7. Conduct regular security assessments and penetration tests focusing on WordPress plugin vulnerabilities. 8. Educate administrators on the risks of installing untrusted plugins or themes that may introduce POP chains.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-1913: CWE-502 Deserialization of Untrusted Data in webtoffee Product Import Export for WooCommerce – Import Export Product CSV Suite
Description
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
AI-Powered Analysis
Technical Analysis
CVE-2025-1913 is a deserialization vulnerability classified under CWE-502 found in the Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress. The vulnerability arises from unsafe deserialization of the 'form_data' parameter, which accepts serialized PHP objects. An attacker with Administrator-level privileges can inject malicious PHP objects through this parameter. However, the vulnerability's exploitability depends on the presence of a Property Oriented Programming (POP) chain in other installed plugins or themes, which can be leveraged to perform malicious actions such as arbitrary file deletion, sensitive data retrieval, or remote code execution. The plugin itself does not contain a POP chain, so the vulnerability is a prerequisite condition rather than a standalone exploit. The CVSS 3.1 score of 7.2 indicates a high severity with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). No known exploits are currently in the wild, but the vulnerability was published on March 26, 2025. The affected versions include all versions up to and including 2.5.0. This vulnerability is particularly relevant for WordPress sites running WooCommerce with this plugin installed alongside other plugins or themes that contain exploitable POP chains.
Potential Impact
For European organizations, this vulnerability poses a significant risk to e-commerce platforms using WooCommerce with the vulnerable plugin. If exploited, attackers could gain the ability to execute arbitrary code, delete critical files, or exfiltrate sensitive customer and business data, leading to data breaches, service disruption, and reputational damage. The requirement for Administrator-level access limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or compromised credentials. The dependency on additional plugins or themes for a POP chain means that organizations with complex WordPress setups are at higher risk. Given the critical role of e-commerce in European markets, successful exploitation could disrupt business operations and violate data protection regulations such as GDPR, resulting in legal and financial consequences.
Mitigation Recommendations
1. Immediately update the Product Import Export for WooCommerce plugin to a patched version once available. 2. Audit all installed plugins and themes for known POP chains or unsafe deserialization patterns; remove or update any that are vulnerable. 3. Restrict Administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication. 4. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious serialized payloads or unusual POST requests targeting the 'form_data' parameter. 5. Regularly monitor logs for anomalous activity related to plugin usage and deserialization attempts. 6. Employ security plugins that can detect and prevent PHP Object Injection attacks. 7. Conduct regular security assessments and penetration tests focusing on WordPress plugin vulnerabilities. 8. Educate administrators on the risks of installing untrusted plugins or themes that may introduce POP chains.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-03T23:08:06.268Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69330fa6f88dbe026cfb4084
Added to database: 12/5/2025, 5:00:22 PM
Last enriched: 12/5/2025, 5:15:16 PM
Last updated: 12/6/2025, 7:23:00 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-13377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 10web 10Web Booster – Website speed optimization, Cache & Page Speed optimizer
CriticalCVE-2025-13907: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tunilame CSS3 Buttons
MediumCVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
MediumCVE-2025-13898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sozan45 Ultra Skype Button
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.