CVE-2025-3743: CWE-472 External Control of Assumed-Immutable Web Parameter in wpswings Upsell Funnel Builder for WooCommerce
The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.
AI Analysis
Technical Summary
CVE-2025-3743 identifies a vulnerability in the Upsell Funnel Builder for WooCommerce plugin, a WordPress extension designed to enhance e-commerce sales by adding order bumps with additional products and discounts. The vulnerability arises from improper validation and control over web parameters in the 'add_offer_in_cart' function, specifically the additional product ID and discount fields. These parameters are assumed to be immutable or controlled internally, but the plugin fails to enforce this, allowing external actors to manipulate them. An unauthenticated attacker can craft requests that modify the product associated with an order bump and the discount applied, effectively altering the order's contents and pricing without authorization. This attack vector leverages CWE-472, which concerns external control of assumptions about immutable web parameters. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). The flaw affects all versions up to and including 3.0.0 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily threatens the integrity of order data, potentially leading to financial loss or fraudulent transactions if exploited.
Potential Impact
The primary impact of CVE-2025-3743 is on the integrity of e-commerce transactions processed through the Upsell Funnel Builder for WooCommerce plugin. Attackers can manipulate order bumps to substitute products or apply unauthorized discounts, resulting in financial losses for merchants. This undermines trust in the ordering process and can lead to revenue leakage. Since the vulnerability does not affect confidentiality or availability, customer data exposure or service disruption is unlikely. However, the ability to alter order details without authentication poses a significant risk to business operations and revenue assurance. Organizations relying on this plugin for upselling and order management may face increased fraud risk, chargebacks, and customer dissatisfaction. The vulnerability's ease of exploitation over the network without authentication or user interaction increases the likelihood of automated attacks or exploitation at scale if weaponized. The lack of known exploits currently limits immediate widespread impact but does not reduce the urgency for mitigation.
Mitigation Recommendations
To mitigate CVE-2025-3743, organizations should first verify if they are using the Upsell Funnel Builder for WooCommerce plugin version 3.0.0 or earlier. Immediate mitigation steps include: 1) Temporarily disabling the plugin or the order bump feature until a patch is available. 2) Implementing web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate 'add_offer_in_cart' parameters, focusing on unexpected product ID and discount values. 3) Applying strict input validation and sanitization on all parameters related to order bumps, ensuring that product IDs and discounts cannot be altered externally. 4) Monitoring e-commerce transactions for anomalous order bumps or unusual discount patterns that could indicate exploitation attempts. 5) Engaging with the plugin vendor or community to obtain patches or updates addressing this vulnerability as soon as they are released. 6) Reviewing and hardening the WooCommerce and WordPress environment, including limiting access to administrative functions and ensuring all components are up to date. 7) Educating development and security teams about CWE-472 risks to prevent similar issues in custom code or other plugins.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, India, France, Netherlands, Brazil, Japan
CVE-2025-3743: CWE-472 External Control of Assumed-Immutable Web Parameter in wpswings Upsell Funnel Builder for WooCommerce
Description
The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-3743 identifies a vulnerability in the Upsell Funnel Builder for WooCommerce plugin, a WordPress extension designed to enhance e-commerce sales by adding order bumps with additional products and discounts. The vulnerability arises from improper validation and control over web parameters in the 'add_offer_in_cart' function, specifically the additional product ID and discount fields. These parameters are assumed to be immutable or controlled internally, but the plugin fails to enforce this, allowing external actors to manipulate them. An unauthenticated attacker can craft requests that modify the product associated with an order bump and the discount applied, effectively altering the order's contents and pricing without authorization. This attack vector leverages CWE-472, which concerns external control of assumptions about immutable web parameters. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). The flaw affects all versions up to and including 3.0.0 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily threatens the integrity of order data, potentially leading to financial loss or fraudulent transactions if exploited.
Potential Impact
The primary impact of CVE-2025-3743 is on the integrity of e-commerce transactions processed through the Upsell Funnel Builder for WooCommerce plugin. Attackers can manipulate order bumps to substitute products or apply unauthorized discounts, resulting in financial losses for merchants. This undermines trust in the ordering process and can lead to revenue leakage. Since the vulnerability does not affect confidentiality or availability, customer data exposure or service disruption is unlikely. However, the ability to alter order details without authentication poses a significant risk to business operations and revenue assurance. Organizations relying on this plugin for upselling and order management may face increased fraud risk, chargebacks, and customer dissatisfaction. The vulnerability's ease of exploitation over the network without authentication or user interaction increases the likelihood of automated attacks or exploitation at scale if weaponized. The lack of known exploits currently limits immediate widespread impact but does not reduce the urgency for mitigation.
Mitigation Recommendations
To mitigate CVE-2025-3743, organizations should first verify if they are using the Upsell Funnel Builder for WooCommerce plugin version 3.0.0 or earlier. Immediate mitigation steps include: 1) Temporarily disabling the plugin or the order bump feature until a patch is available. 2) Implementing web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate 'add_offer_in_cart' parameters, focusing on unexpected product ID and discount values. 3) Applying strict input validation and sanitization on all parameters related to order bumps, ensuring that product IDs and discounts cannot be altered externally. 4) Monitoring e-commerce transactions for anomalous order bumps or unusual discount patterns that could indicate exploitation attempts. 5) Engaging with the plugin vendor or community to obtain patches or updates addressing this vulnerability as soon as they are released. 6) Reviewing and hardening the WooCommerce and WordPress environment, including limiting access to administrative functions and ensuring all components are up to date. 7) Educating development and security teams about CWE-472 risks to prevent similar issues in custom code or other plugins.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-16T17:46:38.616Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf0514
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 2/27/2026, 1:46:26 PM
Last updated: 3/23/2026, 1:21:57 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.