Skip to main content

CVE-2025-39472: CWE-352 Cross-Site Request Forgery (CSRF) in WPWeb WooCommerce Social Login

Medium
VulnerabilityCVE-2025-39472cvecve-2025-39472cwe-352
Published: Wed Apr 16 2025 (04/16/2025, 17:15:50 UTC)
Source: CVE Database V5
Vendor/Project: WPWeb
Product: WooCommerce Social Login

Description

Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a before 2.8.3.

AI-Powered Analysis

AILast updated: 07/09/2025, 14:09:34 UTC

Technical Analysis

CVE-2025-39472 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WPWeb WooCommerce Social Login plugin, which integrates social login capabilities into WooCommerce-based e-commerce websites. This vulnerability affects versions prior to 2.8.3 of the plugin. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request unknowingly, exploiting the user's active session with the target web application. In this case, the vulnerability allows an attacker to perform unauthorized actions on behalf of a logged-in user without their consent. The CVSS 3.1 base score of 4.3 (medium severity) reflects that the attack vector is network-based (remote), requires no privileges, but does require user interaction (e.g., clicking a crafted link). The impact primarily affects the integrity of the affected system, as unauthorized changes or actions could be triggered, but confidentiality and availability are not directly impacted. The vulnerability does not require authentication, increasing its risk profile, but the necessity of user interaction limits automated exploitation. No known exploits are currently reported in the wild, and no official patches or mitigation links have been published at the time of this report. The vulnerability is classified under CWE-352, which is a common web security weakness related to insufficient request validation mechanisms to prevent CSRF attacks. WooCommerce Social Login is widely used by e-commerce sites running on WordPress, enabling customers to log in using social media accounts, which makes this vulnerability relevant for online retail platforms using this plugin.

Potential Impact

For European organizations, especially e-commerce businesses relying on WooCommerce and the WPWeb Social Login plugin, this vulnerability poses a risk of unauthorized actions being performed on user accounts. Potential impacts include unauthorized changes to user profile information, unintended social login linkages, or manipulation of session states that could lead to further exploitation or fraud. While the vulnerability does not directly compromise sensitive data confidentiality or system availability, the integrity breach could undermine customer trust and lead to reputational damage. Given the widespread adoption of WooCommerce in Europe, particularly among small and medium-sized enterprises (SMEs) in retail sectors, exploitation could disrupt business operations and customer experience. Additionally, regulatory frameworks such as GDPR emphasize the protection of user data and integrity, so any unauthorized modification could have compliance implications. The lack of known exploits reduces immediate risk, but the medium severity and ease of remote exploitation with user interaction necessitate prompt attention.

Mitigation Recommendations

European organizations should immediately verify if they use the WPWeb WooCommerce Social Login plugin and identify the version in use. Since no official patch is currently available, organizations should implement compensating controls such as: 1) Enforcing strict Content Security Policy (CSP) headers to limit the domains from which scripts can be loaded, reducing the risk of malicious CSRF payload delivery. 2) Implementing or enhancing anti-CSRF tokens in custom integrations or additional layers to validate legitimate requests. 3) Educating users and administrators about the risks of clicking unsolicited links while authenticated on e-commerce platforms. 4) Monitoring web server logs and user activity for unusual patterns that may indicate CSRF exploitation attempts. 5) Temporarily disabling or restricting the use of the vulnerable plugin if feasible until an official patch is released. 6) Keeping WordPress core, WooCommerce, and all plugins updated to the latest versions to minimize exposure to known vulnerabilities. Organizations should also subscribe to vendor advisories and security mailing lists to apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:43.558Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6846dc927b622a9fdf23bfdb

Added to database: 6/9/2025, 1:07:30 PM

Last enriched: 7/9/2025, 2:09:34 PM

Last updated: 7/31/2025, 8:57:53 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats