Skip to main content

CVE-2025-48123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

Critical
VulnerabilityCVE-2025-48123cvecve-2025-48123cwe-94
Published: Mon Jun 09 2025 (06/09/2025, 15:54:05 UTC)
Source: CVE Database V5
Vendor/Project: Holest Engineering
Product: Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Code Injection. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:47:00 UTC

Technical Analysis

CVE-2025-48123 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, specifically all versions up to 2.4.37. The flaw allows an unauthenticated remote attacker to inject and execute arbitrary code on the affected system without requiring any user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible to attackers. The scope of the vulnerability is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully compromise the affected system, steal sensitive data, modify or delete data, and disrupt service availability. The vulnerability arises from insufficient validation or sanitization of user-supplied input that is used in code generation or execution contexts within the plugin. Since the plugin integrates with WooCommerce and WP E-commerce platforms, which are widely used for online retail, exploitation could lead to complete site takeover, data breaches, and potentially serve as a pivot point for further attacks within the hosting environment. No patches or fixes have been linked yet, and no known exploits are currently reported in the wild, but the critical severity and ease of exploitation make this a high-priority issue for affected users.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce or WP E-commerce with the Holest Engineering Spreadsheet Price Changer plugin, this vulnerability poses a significant risk. Exploitation could lead to full compromise of online stores, resulting in theft of customer data including payment information, disruption of sales operations, and damage to brand reputation. Given the critical nature of the vulnerability, attackers could deploy malware, ransomware, or use compromised sites as launchpads for further attacks within corporate networks. This is particularly concerning for SMEs and large retailers in Europe that rely heavily on these e-commerce platforms for revenue. Additionally, the breach of personal data could lead to violations of the EU General Data Protection Regulation (GDPR), resulting in substantial fines and legal consequences. The vulnerability also threatens supply chain security if exploited in third-party vendor environments integrated with European businesses.

Mitigation Recommendations

Immediate mitigation steps include: 1) Identifying and inventorying all instances of the Holest Engineering Spreadsheet Price Changer plugin in use, particularly versions up to 2.4.37. 2) Temporarily disabling or removing the plugin until a security patch is released by the vendor. 3) Implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting code injection vectors associated with this plugin. 4) Monitoring web server and application logs for unusual activity or signs of exploitation attempts. 5) Applying strict input validation and sanitization at the application level if custom modifications are possible. 6) Ensuring that all WordPress and WooCommerce installations are updated to the latest secure versions and that principle of least privilege is enforced for user accounts. 7) Preparing incident response plans to quickly contain and remediate any detected compromise. Organizations should also subscribe to vendor advisories and Patchstack updates to apply patches as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:28.791Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a883

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 1:47:00 AM

Last updated: 8/15/2025, 7:13:12 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats