Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30923: Cross-Site Request Forgery (CSRF) in powerfulwp Gift Message for WooCommerce

0
Unknown
VulnerabilityCVE-2025-30923cvecve-2025-30923
Published: Thu Mar 27 2025 (03/27/2025, 10:55:58 UTC)
Source: CVE Database V5
Vendor/Project: powerfulwp
Product: Gift Message for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in powerfulwp Gift Message for WooCommerce gift-message-for-woocommerce allows Cross Site Request Forgery.This issue affects Gift Message for WooCommerce: from n/a through <= 1.7.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 00:45:26 UTC

Technical Analysis

The vulnerability identified as CVE-2025-30923 is a Cross-Site Request Forgery (CSRF) issue in the powerfulwp Gift Message for WooCommerce plugin, affecting all versions up to 1.7.8. CSRF vulnerabilities enable attackers to induce authenticated users to submit unwanted requests to a web application in which they are currently authenticated, without their knowledge or consent. In this case, the vulnerability allows an attacker to manipulate gift message data associated with WooCommerce orders by crafting malicious web requests that, when executed by a logged-in user, perform unauthorized actions on their behalf. The plugin lacks sufficient anti-CSRF tokens or validation mechanisms to verify the legitimacy of requests modifying gift message content. This absence of proper request validation means that an attacker can host a malicious webpage or email containing crafted requests that, once visited by an authenticated WooCommerce user, trigger changes to gift messages without explicit user approval. While no public exploits have been reported, the vulnerability is significant because it can compromise the integrity of order-related data, potentially leading to customer confusion, fraudulent order modifications, or reputational damage. The vulnerability does not appear to allow privilege escalation or direct access to sensitive data beyond the scope of gift message manipulation. The affected plugin is widely used in WooCommerce stores, a popular e-commerce platform built on WordPress, which is prevalent globally. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

The primary impact of CVE-2025-30923 is on the integrity of order-related data within WooCommerce stores using the vulnerable Gift Message plugin. Attackers can alter gift messages without the knowledge or consent of the user, potentially leading to customer dissatisfaction, order confusion, or fraudulent activity such as misleading gift content. This can harm the reputation of affected e-commerce businesses and erode customer trust. While the vulnerability does not directly expose sensitive personal or payment information, the unauthorized modification of order data can disrupt business operations and customer relations. Additionally, if attackers combine this vulnerability with other weaknesses, it could facilitate more complex attacks or social engineering schemes. The ease of exploitation—requiring only that a victim be authenticated and visit a malicious page—makes this vulnerability particularly concerning for online stores with active user sessions. Organizations worldwide that rely on WooCommerce and this plugin are at risk, especially those with high transaction volumes or gift message usage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2025-30923, organizations should immediately update the Gift Message for WooCommerce plugin to a version that addresses this CSRF vulnerability once a patch is released by powerfulwp. Until an official patch is available, administrators can implement several practical measures: (1) Employ Web Application Firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WooCommerce endpoints. (2) Restrict administrative and user session lifetimes to minimize the window of opportunity for CSRF exploitation. (3) Educate users and administrators to avoid clicking on suspicious links or visiting untrusted websites while logged into WooCommerce accounts. (4) Implement additional server-side validation for gift message modifications, such as requiring re-authentication or CAPTCHA challenges for sensitive actions. (5) Monitor logs for unusual or unauthorized changes to gift messages or order data to detect potential exploitation attempts. (6) Consider disabling the gift message feature temporarily if it is not critical to business operations until the vulnerability is remediated. These steps, combined with timely patching, will reduce the risk of exploitation and protect data integrity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:21:51.871Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7334e6bfc5ba1def0cd8

Added to database: 4/1/2026, 7:34:12 PM

Last enriched: 4/2/2026, 12:45:26 AM

Last updated: 4/6/2026, 9:32:56 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses