Skip to main content

CVE-2025-53271: CWE-352 Cross-Site Request Forgery (CSRF) in Anton Bond Additional Order Filters for WooCommerce

High
VulnerabilityCVE-2025-53271cvecve-2025-53271cwe-352
Published: Fri Jun 27 2025 (06/27/2025, 13:21:14 UTC)
Source: CVE Database V5
Vendor/Project: Anton Bond
Product: Additional Order Filters for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Anton Bond Additional Order Filters for WooCommerce allows Stored XSS. This issue affects Additional Order Filters for WooCommerce: from n/a through 1.22.

AI-Powered Analysis

AILast updated: 06/27/2025, 14:10:47 UTC

Technical Analysis

CVE-2025-53271 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) found in the 'Anton Bond Additional Order Filters for WooCommerce' plugin, affecting versions up to 1.22. This vulnerability allows an attacker to perform CSRF attacks that can lead to Stored Cross-Site Scripting (XSS). Specifically, the flaw enables an attacker to trick an authenticated WooCommerce administrator or user into submitting unauthorized requests to the plugin, which then stores malicious scripts. When these scripts are later rendered in the context of the WooCommerce admin or user interface, they execute, potentially allowing attackers to hijack sessions, steal credentials, or perform actions with the victim’s privileges. The CVSS 3.1 base score is 7.1, indicating a high severity level, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low level individually but combined can lead to significant compromise. No known exploits are currently in the wild, and no patches are yet published. The vulnerability is significant because WooCommerce is a widely used e-commerce platform, and plugins like Additional Order Filters are common for enhancing order management. The stored XSS via CSRF can be leveraged for persistent attacks against site administrators or customers, potentially leading to broader compromise of e-commerce sites.

Potential Impact

For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized actions on order management, manipulation of order data, or injection of malicious scripts that compromise administrative sessions or customer data. This can result in data breaches involving personal and payment information, undermining GDPR compliance and leading to regulatory penalties. The persistent nature of stored XSS increases the risk of widespread infection across users and administrators. Additionally, the integrity of order processing and availability of e-commerce services may be disrupted, affecting business operations and customer trust. Given the reliance on WooCommerce by many small and medium enterprises in Europe, the threat could have a broad impact, especially if attackers leverage the vulnerability to pivot into deeper network segments or deploy further malware.

Mitigation Recommendations

Immediate mitigation should include disabling or uninstalling the vulnerable 'Additional Order Filters for WooCommerce' plugin until a patch is released. Administrators should monitor for unusual order activity or unexpected changes in order filters. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin’s endpoints can reduce risk. Enforce strict Content Security Policy (CSP) headers to limit the impact of any injected scripts. Additionally, ensure that all WooCommerce and WordPress installations enforce strong anti-CSRF tokens on all state-changing requests, especially for plugins. Regularly audit installed plugins for updates and security advisories. Educate administrators about phishing and social engineering tactics that could trigger CSRF attacks. Finally, conduct security testing focusing on plugin interactions and stored XSS vectors to identify any residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T11:58:33.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ea032f6cf9081996a796a

Added to database: 6/27/2025, 1:44:18 PM

Last enriched: 6/27/2025, 2:10:47 PM

Last updated: 7/31/2025, 6:02:57 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats