CVE-2025-48342: CWE-352 Cross-Site Request Forgery (CSRF) in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce
Cross-Site Request Forgery (CSRF) vulnerability in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce allows Cross Site Request Forgery. This issue affects Dynamic Pricing & Discounts Lite for WooCommerce: from n/a through 2.0.3.
AI Analysis
Technical Summary
CVE-2025-48342 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Dynamic Pricing & Discounts Lite plugin for WooCommerce, developed by RedefiningTheWeb. This vulnerability affects versions up to 2.0.3 and allows an attacker to trick an authenticated WooCommerce administrator or user into executing unwanted actions on the vulnerable plugin without their consent. Specifically, CSRF exploits the trust that a web application places in the user's browser by sending unauthorized commands from a user that the web application trusts. In this case, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the Dynamic Pricing & Discounts Lite plugin to perform unintended operations such as modifying pricing rules or discount configurations. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack can be performed remotely over the network with low attack complexity, does not require privileges or authentication, but does require user interaction (e.g., clicking a link). The impact affects the integrity and availability of the plugin's functionality but does not compromise confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the plugin's role in managing dynamic pricing and discounts in WooCommerce stores, successful exploitation could disrupt pricing strategies, cause financial discrepancies, or degrade the availability of pricing features.
Potential Impact
For European organizations using WooCommerce with the Dynamic Pricing & Discounts Lite plugin, this vulnerability poses a risk to the integrity and availability of their e-commerce pricing configurations. Attackers could manipulate discount rules or pricing parameters, potentially leading to financial losses, customer dissatisfaction, or reputational damage. Since WooCommerce is widely used by small to medium-sized enterprises (SMEs) across Europe for online retail, the impact could be significant in sectors relying heavily on dynamic pricing strategies, such as retail, travel, and event ticketing. The requirement for user interaction means that phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk to organizations with less mature cybersecurity awareness. Additionally, disruption of pricing mechanisms could affect compliance with consumer protection regulations in the EU, leading to legal and regulatory consequences. However, the absence of confidentiality impact limits the risk of data breaches directly from this vulnerability.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately verify if the Dynamic Pricing & Discounts Lite plugin version 2.0.3 or earlier is in use and plan for an upgrade once a patched version is released. 2) Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks by limiting cross-origin requests. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WooCommerce plugins. 4) Educate administrators and users with elevated privileges about the risks of clicking on unsolicited links or visiting untrusted websites while logged into the WooCommerce backend. 5) Monitor logs for unusual changes in pricing or discount configurations that could indicate exploitation attempts. 6) Consider temporarily disabling or restricting access to the plugin's administrative functions until a patch is available. 7) Engage with the plugin vendor or community to track patch releases and vulnerability disclosures actively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48342: CWE-352 Cross-Site Request Forgery (CSRF) in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce
Description
Cross-Site Request Forgery (CSRF) vulnerability in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce allows Cross Site Request Forgery. This issue affects Dynamic Pricing & Discounts Lite for WooCommerce: from n/a through 2.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-48342 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Dynamic Pricing & Discounts Lite plugin for WooCommerce, developed by RedefiningTheWeb. This vulnerability affects versions up to 2.0.3 and allows an attacker to trick an authenticated WooCommerce administrator or user into executing unwanted actions on the vulnerable plugin without their consent. Specifically, CSRF exploits the trust that a web application places in the user's browser by sending unauthorized commands from a user that the web application trusts. In this case, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the Dynamic Pricing & Discounts Lite plugin to perform unintended operations such as modifying pricing rules or discount configurations. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack can be performed remotely over the network with low attack complexity, does not require privileges or authentication, but does require user interaction (e.g., clicking a link). The impact affects the integrity and availability of the plugin's functionality but does not compromise confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the plugin's role in managing dynamic pricing and discounts in WooCommerce stores, successful exploitation could disrupt pricing strategies, cause financial discrepancies, or degrade the availability of pricing features.
Potential Impact
For European organizations using WooCommerce with the Dynamic Pricing & Discounts Lite plugin, this vulnerability poses a risk to the integrity and availability of their e-commerce pricing configurations. Attackers could manipulate discount rules or pricing parameters, potentially leading to financial losses, customer dissatisfaction, or reputational damage. Since WooCommerce is widely used by small to medium-sized enterprises (SMEs) across Europe for online retail, the impact could be significant in sectors relying heavily on dynamic pricing strategies, such as retail, travel, and event ticketing. The requirement for user interaction means that phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk to organizations with less mature cybersecurity awareness. Additionally, disruption of pricing mechanisms could affect compliance with consumer protection regulations in the EU, leading to legal and regulatory consequences. However, the absence of confidentiality impact limits the risk of data breaches directly from this vulnerability.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately verify if the Dynamic Pricing & Discounts Lite plugin version 2.0.3 or earlier is in use and plan for an upgrade once a patched version is released. 2) Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks by limiting cross-origin requests. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WooCommerce plugins. 4) Educate administrators and users with elevated privileges about the risks of clicking on unsolicited links or visiting untrusted websites while logged into the WooCommerce backend. 5) Monitor logs for unusual changes in pricing or discount configurations that could indicate exploitation attempts. 6) Consider temporarily disabling or restricting access to the plugin's administrative functions until a patch is available. 7) Engage with the plugin vendor or community to track patch releases and vulnerability disclosures actively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:41:32.123Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb681
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:47:37 PM
Last updated: 7/30/2025, 4:08:01 PM
Views: 14
Related Threats
CVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumCVE-2025-8314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emarket-design Project Management, Bug and Issue Tracking Plugin – Software Issue Manager
MediumCVE-2025-8059: CWE-862 Missing Authorization in bplugins B Blocks – The ultimate block collection
CriticalCVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.