Skip to main content

CVE-2025-48342: CWE-352 Cross-Site Request Forgery (CSRF) in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce

Low
VulnerabilityCVE-2025-48342cvecve-2025-48342cwe-352
Published: Mon May 19 2025 (05/19/2025, 14:55:22 UTC)
Source: CVE
Vendor/Project: RedefiningTheWeb
Product: Dynamic Pricing & Discounts Lite for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce allows Cross Site Request Forgery. This issue affects Dynamic Pricing & Discounts Lite for WooCommerce: from n/a through 2.0.3.

AI-Powered Analysis

AILast updated: 07/11/2025, 18:47:37 UTC

Technical Analysis

CVE-2025-48342 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Dynamic Pricing & Discounts Lite plugin for WooCommerce, developed by RedefiningTheWeb. This vulnerability affects versions up to 2.0.3 and allows an attacker to trick an authenticated WooCommerce administrator or user into executing unwanted actions on the vulnerable plugin without their consent. Specifically, CSRF exploits the trust that a web application places in the user's browser by sending unauthorized commands from a user that the web application trusts. In this case, an attacker could craft a malicious web page or link that, when visited by an authenticated user, causes the Dynamic Pricing & Discounts Lite plugin to perform unintended operations such as modifying pricing rules or discount configurations. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack can be performed remotely over the network with low attack complexity, does not require privileges or authentication, but does require user interaction (e.g., clicking a link). The impact affects the integrity and availability of the plugin's functionality but does not compromise confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the plugin's role in managing dynamic pricing and discounts in WooCommerce stores, successful exploitation could disrupt pricing strategies, cause financial discrepancies, or degrade the availability of pricing features.

Potential Impact

For European organizations using WooCommerce with the Dynamic Pricing & Discounts Lite plugin, this vulnerability poses a risk to the integrity and availability of their e-commerce pricing configurations. Attackers could manipulate discount rules or pricing parameters, potentially leading to financial losses, customer dissatisfaction, or reputational damage. Since WooCommerce is widely used by small to medium-sized enterprises (SMEs) across Europe for online retail, the impact could be significant in sectors relying heavily on dynamic pricing strategies, such as retail, travel, and event ticketing. The requirement for user interaction means that phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk to organizations with less mature cybersecurity awareness. Additionally, disruption of pricing mechanisms could affect compliance with consumer protection regulations in the EU, leading to legal and regulatory consequences. However, the absence of confidentiality impact limits the risk of data breaches directly from this vulnerability.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediately verify if the Dynamic Pricing & Discounts Lite plugin version 2.0.3 or earlier is in use and plan for an upgrade once a patched version is released. 2) Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks by limiting cross-origin requests. 3) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WooCommerce plugins. 4) Educate administrators and users with elevated privileges about the risks of clicking on unsolicited links or visiting untrusted websites while logged into the WooCommerce backend. 5) Monitor logs for unusual changes in pricing or discount configurations that could indicate exploitation attempts. 6) Consider temporarily disabling or restricting access to the plugin's administrative functions until a patch is available. 7) Engage with the plugin vendor or community to track patch releases and vulnerability disclosures actively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-19T14:41:32.123Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb681

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 6:47:37 PM

Last updated: 7/30/2025, 4:08:01 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats