CVE-2025-2168: CWE-352 Cross-Site Request Forgery (CSRF) in bdthemes Ultimate Store Kit – Elementor powered WooCommerce Builder, 80+ Widgets and Template Builder
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.1. This is due to missing or incorrect nonce validation on the dismiss() function. This makes it possible for unauthenticated attackers to set arbitrary user meta values to `1` which can be leveraged to lock and administrator out of their site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-2168 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Ultimate Store Kit – Elementor powered WooCommerce Builder plugin for WordPress, developed by bdthemes. This plugin provides over 80 widgets and template-building capabilities for WooCommerce and Elementor-based e-commerce sites. The vulnerability exists in all versions up to and including 2.4.1 due to missing or incorrect nonce validation in the dismiss() function. Nonces are security tokens used to verify the legitimacy of requests and prevent unauthorized actions. Because nonce validation is absent or improperly implemented, an unauthenticated attacker can craft a malicious request that, if an administrator is tricked into clicking (user interaction required), will set arbitrary user meta values to '1'. This manipulation can be leveraged to lock administrators out of their own site by altering critical user metadata. The attack vector is remote and requires no prior authentication, but it does require the victim administrator to interact with a malicious link or request. The vulnerability impacts the integrity of the site by allowing unauthorized modification of user metadata, but it does not directly affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the low complexity of attack and lack of required privileges, but limited impact scope and user interaction requirement. No known exploits are currently reported in the wild. The vulnerability is specific to WordPress sites using this particular plugin, which is popular among WooCommerce and Elementor users for building e-commerce storefronts with enhanced UI components and templates.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with WooCommerce and Elementor, this vulnerability poses a risk to site integrity and administrative control. An attacker could exploit this CSRF flaw to lock out site administrators by modifying user meta values, potentially disrupting site management and delaying critical updates or responses to other threats. While the vulnerability does not directly compromise customer data confidentiality or site availability, the loss of administrative access could lead to prolonged downtime or inability to manage orders, impacting business operations and customer trust. Organizations relying on this plugin for their online storefronts may face operational disruptions and reputational damage if exploited. Additionally, since WooCommerce is widely used in Europe for online retail, the risk is non-negligible. The requirement for user interaction (administrator clicking a malicious link) means that social engineering or phishing tactics could be employed, increasing the threat surface. The vulnerability could also be leveraged as part of a multi-stage attack to gain further control or persistence on the affected site.
Mitigation Recommendations
1. Immediate update: Organizations should verify if they are using the Ultimate Store Kit plugin version 2.4.1 or earlier and upgrade to the latest patched version once available. Since no patch links are currently provided, monitoring bdthemes’ official channels for updates is critical. 2. Implement Web Application Firewall (WAF) rules: Deploy WAF rules to detect and block suspicious CSRF attempts targeting the dismiss() function or related endpoints. 3. Harden administrator workflows: Educate administrators to avoid clicking on untrusted links, especially those received via email or messaging platforms, to reduce the risk of social engineering. 4. Use security plugins: Employ WordPress security plugins that add additional CSRF protections or nonce validations as a temporary safeguard. 5. Restrict admin access: Limit administrative access to trusted IP addresses or via VPN to reduce exposure. 6. Monitor logs: Regularly review web server and application logs for unusual POST requests or user meta changes that could indicate exploitation attempts. 7. Backup regularly: Maintain frequent backups of the WordPress site and database to enable quick recovery in case of lockout or compromise. 8. Consider disabling or replacing the plugin temporarily if a patch is not yet available and the risk is deemed high.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2168: CWE-352 Cross-Site Request Forgery (CSRF) in bdthemes Ultimate Store Kit – Elementor powered WooCommerce Builder, 80+ Widgets and Template Builder
Description
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.1. This is due to missing or incorrect nonce validation on the dismiss() function. This makes it possible for unauthenticated attackers to set arbitrary user meta values to `1` which can be leveraged to lock and administrator out of their site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-2168 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Ultimate Store Kit – Elementor powered WooCommerce Builder plugin for WordPress, developed by bdthemes. This plugin provides over 80 widgets and template-building capabilities for WooCommerce and Elementor-based e-commerce sites. The vulnerability exists in all versions up to and including 2.4.1 due to missing or incorrect nonce validation in the dismiss() function. Nonces are security tokens used to verify the legitimacy of requests and prevent unauthorized actions. Because nonce validation is absent or improperly implemented, an unauthenticated attacker can craft a malicious request that, if an administrator is tricked into clicking (user interaction required), will set arbitrary user meta values to '1'. This manipulation can be leveraged to lock administrators out of their own site by altering critical user metadata. The attack vector is remote and requires no prior authentication, but it does require the victim administrator to interact with a malicious link or request. The vulnerability impacts the integrity of the site by allowing unauthorized modification of user metadata, but it does not directly affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the low complexity of attack and lack of required privileges, but limited impact scope and user interaction requirement. No known exploits are currently reported in the wild. The vulnerability is specific to WordPress sites using this particular plugin, which is popular among WooCommerce and Elementor users for building e-commerce storefronts with enhanced UI components and templates.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with WooCommerce and Elementor, this vulnerability poses a risk to site integrity and administrative control. An attacker could exploit this CSRF flaw to lock out site administrators by modifying user meta values, potentially disrupting site management and delaying critical updates or responses to other threats. While the vulnerability does not directly compromise customer data confidentiality or site availability, the loss of administrative access could lead to prolonged downtime or inability to manage orders, impacting business operations and customer trust. Organizations relying on this plugin for their online storefronts may face operational disruptions and reputational damage if exploited. Additionally, since WooCommerce is widely used in Europe for online retail, the risk is non-negligible. The requirement for user interaction (administrator clicking a malicious link) means that social engineering or phishing tactics could be employed, increasing the threat surface. The vulnerability could also be leveraged as part of a multi-stage attack to gain further control or persistence on the affected site.
Mitigation Recommendations
1. Immediate update: Organizations should verify if they are using the Ultimate Store Kit plugin version 2.4.1 or earlier and upgrade to the latest patched version once available. Since no patch links are currently provided, monitoring bdthemes’ official channels for updates is critical. 2. Implement Web Application Firewall (WAF) rules: Deploy WAF rules to detect and block suspicious CSRF attempts targeting the dismiss() function or related endpoints. 3. Harden administrator workflows: Educate administrators to avoid clicking on untrusted links, especially those received via email or messaging platforms, to reduce the risk of social engineering. 4. Use security plugins: Employ WordPress security plugins that add additional CSRF protections or nonce validations as a temporary safeguard. 5. Restrict admin access: Limit administrative access to trusted IP addresses or via VPN to reduce exposure. 6. Monitor logs: Regularly review web server and application logs for unusual POST requests or user meta changes that could indicate exploitation attempts. 7. Backup regularly: Maintain frequent backups of the WordPress site and database to enable quick recovery in case of lockout or compromise. 8. Consider disabling or replacing the plugin temporarily if a patch is not yet available and the risk is deemed high.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-10T14:05:43.035Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbecf6b
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 6/25/2025, 5:40:47 PM
Last updated: 8/13/2025, 11:13:52 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.