Skip to main content

CVE-2025-49077: CWE-352 Cross-Site Request Forgery (CSRF) in ThemeHigh Dynamic Pricing and Discount Rules

Low
VulnerabilityCVE-2025-49077cvecve-2025-49077cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 11:18:47 UTC)
Source: CVE Database V5
Vendor/Project: ThemeHigh
Product: Dynamic Pricing and Discount Rules

Description

Cross-Site Request Forgery (CSRF) vulnerability in ThemeHigh Dynamic Pricing and Discount Rules allows Cross Site Request Forgery.This issue affects Dynamic Pricing and Discount Rules: from n/a through 2.2.9.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:26:48 UTC

Technical Analysis

CVE-2025-49077 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the ThemeHigh Dynamic Pricing and Discount Rules plugin, affecting versions up to 2.2.9. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unwanted requests to a web application in which they are currently authenticated. In this case, the vulnerability could enable an attacker to perform unauthorized actions related to pricing and discount rules without the user's consent. The vulnerability does not require prior authentication (PR:N) but does require user interaction (UI:R), such as clicking a malicious link or visiting a crafted webpage. The CVSS v3.1 base score is 4.3, indicating a low severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and the impact is limited to integrity (I:L) with no impact on confidentiality or availability. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability is categorized under CWE-352, which specifically relates to CSRF issues where state-changing requests can be forged. This vulnerability could allow attackers to manipulate pricing or discount configurations, potentially leading to unauthorized discounts or pricing changes that could affect business revenue or customer trust.

Potential Impact

For European organizations using the ThemeHigh Dynamic Pricing and Discount Rules plugin, this vulnerability could lead to unauthorized modification of pricing or discount settings on their e-commerce platforms. Although the severity is rated low, the integrity impact could result in financial losses due to manipulated discounts or pricing rules. This could also damage customer trust if pricing inconsistencies are noticed. Since the vulnerability requires user interaction, the risk is somewhat mitigated by user awareness, but phishing or social engineering campaigns could increase exploitation likelihood. The impact is more pronounced for organizations heavily reliant on automated pricing strategies or discount campaigns, especially in competitive retail markets. Additionally, regulatory compliance concerns such as GDPR could be indirectly affected if pricing manipulations lead to customer disputes or data handling issues. The lack of confidentiality and availability impact reduces the risk of data breaches or service outages, but the integrity compromise remains a concern for business operations.

Mitigation Recommendations

European organizations should implement specific mitigations beyond generic CSRF protections. First, ensure that the plugin is updated to the latest version once a patch is released by ThemeHigh. Until then, consider disabling or restricting access to the Dynamic Pricing and Discount Rules plugin functionalities to trusted administrators only. Implement strict Content Security Policy (CSP) headers to limit the domains from which scripts can be loaded, reducing the risk of malicious CSRF payload delivery. Employ anti-CSRF tokens in all state-changing requests related to pricing and discount rules, verifying their presence and validity server-side. Monitor logs for unusual changes in pricing or discount configurations, and establish alerting mechanisms for suspicious activities. Educate users and administrators about phishing risks and the importance of not clicking on suspicious links while authenticated to the e-commerce platform. Where possible, implement multi-factor authentication (MFA) for administrative access to reduce the risk of session hijacking that could facilitate CSRF exploitation. Finally, conduct regular security assessments and penetration tests focusing on web application vulnerabilities including CSRF.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-30T14:04:49.666Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842df031a426642debc93ab

Added to database: 6/6/2025, 12:28:51 PM

Last enriched: 7/7/2025, 7:26:48 PM

Last updated: 8/7/2025, 11:16:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats