CVE-2025-48123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light
Improper Control of Generation of Code ('Code Injection') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Code Injection. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
AI Analysis
Technical Summary
CVE-2025-48123 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, specifically all versions up to 2.4.37. The flaw allows an unauthenticated remote attacker to inject and execute arbitrary code on the affected system without requiring any user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible to attackers. The scope of the vulnerability is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully compromise the affected system, steal sensitive data, modify or delete data, and disrupt service availability. The vulnerability arises from insufficient validation or sanitization of user-supplied input that is used in code generation or execution contexts within the plugin. Since the plugin integrates with WooCommerce and WP E-commerce platforms, which are widely used for online retail, exploitation could lead to complete site takeover, data breaches, and potentially serve as a pivot point for further attacks within the hosting environment. No patches or fixes have been linked yet, and no known exploits are currently reported in the wild, but the critical severity and ease of exploitation make this a high-priority issue for affected users.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce or WP E-commerce with the Holest Engineering Spreadsheet Price Changer plugin, this vulnerability poses a significant risk. Exploitation could lead to full compromise of online stores, resulting in theft of customer data including payment information, disruption of sales operations, and damage to brand reputation. Given the critical nature of the vulnerability, attackers could deploy malware, ransomware, or use compromised sites as launchpads for further attacks within corporate networks. This is particularly concerning for SMEs and large retailers in Europe that rely heavily on these e-commerce platforms for revenue. Additionally, the breach of personal data could lead to violations of the EU General Data Protection Regulation (GDPR), resulting in substantial fines and legal consequences. The vulnerability also threatens supply chain security if exploited in third-party vendor environments integrated with European businesses.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all instances of the Holest Engineering Spreadsheet Price Changer plugin in use, particularly versions up to 2.4.37. 2) Temporarily disabling or removing the plugin until a security patch is released by the vendor. 3) Implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting code injection vectors associated with this plugin. 4) Monitoring web server and application logs for unusual activity or signs of exploitation attempts. 5) Applying strict input validation and sanitization at the application level if custom modifications are possible. 6) Ensuring that all WordPress and WooCommerce installations are updated to the latest secure versions and that principle of least privilege is enforced for user accounts. 7) Preparing incident response plans to quickly contain and remediate any detected compromise. Organizations should also subscribe to vendor advisories and Patchstack updates to apply patches as soon as they become available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48123: CWE-94 Improper Control of Generation of Code ('Code Injection') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Code Injection. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
AI-Powered Analysis
Technical Analysis
CVE-2025-48123 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, specifically all versions up to 2.4.37. The flaw allows an unauthenticated remote attacker to inject and execute arbitrary code on the affected system without requiring any user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible to attackers. The scope of the vulnerability is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact is severe across confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully compromise the affected system, steal sensitive data, modify or delete data, and disrupt service availability. The vulnerability arises from insufficient validation or sanitization of user-supplied input that is used in code generation or execution contexts within the plugin. Since the plugin integrates with WooCommerce and WP E-commerce platforms, which are widely used for online retail, exploitation could lead to complete site takeover, data breaches, and potentially serve as a pivot point for further attacks within the hosting environment. No patches or fixes have been linked yet, and no known exploits are currently reported in the wild, but the critical severity and ease of exploitation make this a high-priority issue for affected users.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce or WP E-commerce with the Holest Engineering Spreadsheet Price Changer plugin, this vulnerability poses a significant risk. Exploitation could lead to full compromise of online stores, resulting in theft of customer data including payment information, disruption of sales operations, and damage to brand reputation. Given the critical nature of the vulnerability, attackers could deploy malware, ransomware, or use compromised sites as launchpads for further attacks within corporate networks. This is particularly concerning for SMEs and large retailers in Europe that rely heavily on these e-commerce platforms for revenue. Additionally, the breach of personal data could lead to violations of the EU General Data Protection Regulation (GDPR), resulting in substantial fines and legal consequences. The vulnerability also threatens supply chain security if exploited in third-party vendor environments integrated with European businesses.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all instances of the Holest Engineering Spreadsheet Price Changer plugin in use, particularly versions up to 2.4.37. 2) Temporarily disabling or removing the plugin until a security patch is released by the vendor. 3) Implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting code injection vectors associated with this plugin. 4) Monitoring web server and application logs for unusual activity or signs of exploitation attempts. 5) Applying strict input validation and sanitization at the application level if custom modifications are possible. 6) Ensuring that all WordPress and WooCommerce installations are updated to the latest secure versions and that principle of least privilege is enforced for user accounts. 7) Preparing incident response plans to quickly contain and remediate any detected compromise. Organizations should also subscribe to vendor advisories and Patchstack updates to apply patches as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T18:01:28.791Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f581b0bd07c3938a883
Added to database: 6/10/2025, 6:54:16 PM
Last enriched: 7/11/2025, 1:47:00 AM
Last updated: 8/15/2025, 7:13:12 PM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.