Skip to main content

CVE-2025-48129: CWE-266 Incorrect Privilege Assignment in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

Critical
VulnerabilityCVE-2025-48129cvecve-2025-48129cwe-266
Published: Mon Jun 09 2025 (06/09/2025, 15:54:02 UTC)
Source: CVE Database V5
Vendor/Project: Holest Engineering
Product: Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

Description

Incorrect Privilege Assignment vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Privilege Escalation. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.

AI-Powered Analysis

AILast updated: 06/10/2025, 22:10:09 UTC

Technical Analysis

CVE-2025-48129 is a critical security vulnerability classified under CWE-266 (Incorrect Privilege Assignment) affecting the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, up to version 2.4.37. This plugin is designed to facilitate bulk price changes in e-commerce platforms built on WordPress, specifically WooCommerce and WP E-commerce. The vulnerability allows an unauthenticated attacker to escalate privileges without any user interaction, due to improper assignment of permissions within the plugin's code. The CVSS v3.1 score of 9.8 indicates a critical severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability (all rated high), meaning an attacker can potentially gain full control over the affected system, manipulate pricing data, and disrupt e-commerce operations. The vulnerability is exploitable remotely over the network, making it highly dangerous for online stores using this plugin. No patches or fixes have been published yet, and no known exploits are currently observed in the wild, but the critical nature demands immediate attention. The vulnerability's root cause lies in incorrect privilege assignment, which likely means that sensitive functions or administrative capabilities are exposed to unauthorized users, enabling privilege escalation and full compromise of the e-commerce platform.

Potential Impact

For European organizations operating e-commerce websites using WordPress with WooCommerce or WP E-commerce and the vulnerable Holest Engineering Spreadsheet Price Changer plugin, this vulnerability poses a significant risk. Exploitation can lead to unauthorized price manipulation, financial fraud, data breaches involving customer and transaction data, and potential disruption of sales operations. This can damage brand reputation, cause direct financial losses, and lead to regulatory non-compliance under GDPR due to exposure of personal data. The critical severity and ease of exploitation mean attackers can compromise systems without authentication or user interaction, increasing the likelihood of automated attacks and widespread exploitation. Small and medium-sized enterprises (SMEs), which often rely on plugins for functionality and may have limited security resources, are particularly vulnerable. Additionally, the integrity of pricing data is crucial for competitive markets in Europe, and manipulation could distort market fairness and consumer trust. The availability impact could also result in denial of service or operational downtime, affecting revenue streams.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement the following specific mitigations: 1) Disable or uninstall the Holest Engineering Spreadsheet Price Changer plugin until a secure update is released. 2) Restrict access to the WordPress admin panel and plugin-related endpoints using network-level controls such as IP whitelisting or VPN access to limit exposure. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin's functionality. 4) Conduct thorough audits of user roles and permissions within WordPress to ensure no excessive privileges are granted, and remove any unknown or unnecessary admin accounts. 5) Monitor logs for unusual activity related to price changes or administrative actions. 6) Prepare incident response plans specifically for e-commerce fraud and data breaches. 7) Engage with Holest Engineering or plugin maintainers to track patch releases and apply updates promptly. 8) Consider alternative, more secure plugins for bulk price management if immediate patching is not feasible. These targeted actions go beyond generic advice by focusing on access restriction, monitoring, and operational readiness tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:28.792Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a890

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 6/10/2025, 10:10:09 PM

Last updated: 7/6/2025, 3:23:34 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats