Skip to main content

CVE-2025-49977: CWE-352 Cross-Site Request Forgery (CSRF) in WP Inventory WP Inventory Manager

Medium
VulnerabilityCVE-2025-49977cvecve-2025-49977cwe-352
Published: Fri Jun 20 2025 (06/20/2025, 15:04:14 UTC)
Source: CVE Database V5
Vendor/Project: WP Inventory
Product: WP Inventory Manager

Description

Cross-Site Request Forgery (CSRF) vulnerability in WP Inventory WP Inventory Manager allows Cross Site Request Forgery. This issue affects WP Inventory Manager: from n/a through 2.3.4.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:21:21 UTC

Technical Analysis

CVE-2025-49977 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP Inventory Manager plugin for WordPress, affecting versions up to and including 2.3.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application without their consent, exploiting the user's active session and privileges. In this case, the vulnerability allows an attacker to perform unauthorized state-changing actions on the WP Inventory Manager plugin by leveraging the victim's authenticated session. The CVSS 3.1 base score of 4.3 reflects a medium severity rating, indicating that while the attack vector is remote and requires no privileges, it does require user interaction (the victim must visit a malicious site or click a crafted link). The vulnerability impacts the integrity of the affected system by enabling unauthorized modifications but does not affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability is classified under CWE-352, which is a common web application security weakness related to insufficient request validation against CSRF attacks. Given the plugin’s role in managing inventory data within WordPress sites, successful exploitation could lead to unauthorized changes in inventory records, potentially disrupting business operations or causing inaccurate inventory reporting.

Potential Impact

For European organizations using WordPress sites with the WP Inventory Manager plugin, this vulnerability poses a risk to the integrity of their inventory data. Unauthorized modifications could lead to incorrect stock levels, financial discrepancies, or operational disruptions, especially for e-commerce businesses or supply chain management systems relying on accurate inventory tracking. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can indirectly affect business decisions and customer trust. Since exploitation requires user interaction and an authenticated session, the risk is higher for organizations with many users who have administrative or inventory management privileges. Additionally, organizations with less mature cybersecurity awareness or lacking anti-CSRF protections in their web applications may be more vulnerable. The absence of known active exploits reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using the WP Inventory Manager plugin version 2.3.4 or earlier. Immediate steps include: 1) Restricting administrative and inventory management privileges to only trusted users, minimizing the number of accounts that could be exploited via CSRF. 2) Implementing web application firewall (WAF) rules that detect and block suspicious CSRF attempts targeting the plugin’s endpoints. 3) Encouraging users to avoid clicking on untrusted links or visiting suspicious websites while authenticated to the WordPress admin panel. 4) Monitoring logs for unusual inventory modification activities that could indicate exploitation attempts. 5) Applying strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. 6) Once available, promptly applying vendor patches or updates addressing the vulnerability. 7) If patching is delayed, consider temporarily disabling the plugin or restricting access to its functionality via IP whitelisting or other access controls. 8) Educating users on CSRF risks and safe browsing practices to reduce the likelihood of user interaction exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:48.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e84aded773421b5a9c7

Added to database: 6/21/2025, 10:50:44 AM

Last enriched: 6/21/2025, 12:21:21 PM

Last updated: 8/5/2025, 4:32:17 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats