CVE-2025-58991: CWE-352 Cross-Site Request Forgery (CSRF) in Cristiano Zanca WooCommerce Booking Bundle Hours
Cross-Site Request Forgery (CSRF) vulnerability in Cristiano Zanca WooCommerce Booking Bundle Hours allows Stored XSS. This issue affects WooCommerce Booking Bundle Hours: from n/a through 0.7.4.
AI Analysis
Technical Summary
CVE-2025-58991 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WooCommerce Booking Bundle Hours plugin developed by Cristiano Zanca, specifically versions up to 0.7.4. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent, leveraging the user's active session. The CSRF flaw is compounded by the presence of Stored Cross-Site Scripting (XSS), which means that malicious scripts can be persistently injected and executed in the context of the victim's browser. The CVSS 3.1 score of 7.1 indicates a high impact with network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The vulnerability affects confidentiality, integrity, and availability due to the ability to execute unauthorized commands and inject persistent scripts. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No patches or known exploits in the wild are currently reported, but the risk remains significant given the plugin’s integration with WooCommerce, a widely used e-commerce platform for WordPress. Attackers could exploit this vulnerability to manipulate booking data, inject malicious payloads, or disrupt service availability by exploiting the CSRF to perform actions like changing bookings or configurations, while the Stored XSS could be used for session hijacking or delivering further malware.
Potential Impact
For European organizations using WooCommerce with the Booking Bundle Hours plugin, this vulnerability poses a significant risk to e-commerce operations, customer trust, and data integrity. Exploitation could lead to unauthorized modification of booking information, financial fraud, or leakage of sensitive customer data. The Stored XSS aspect increases the risk of broader compromise through session hijacking or malware delivery, potentially affecting not only the website but also its users. Disruption of booking services can impact revenue and reputation, especially for businesses relying on online appointment or resource scheduling. Given the widespread adoption of WooCommerce in Europe, particularly among SMEs in retail, hospitality, and services sectors, the threat could have a broad operational and financial impact. Additionally, GDPR implications arise if personal data is compromised, leading to regulatory penalties and loss of customer confidence.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify the presence of the Booking Bundle Hours plugin and its version. Until an official patch is released, mitigation should include disabling or removing the vulnerable plugin to prevent exploitation. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attack patterns and suspicious POST requests targeting booking endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of Stored XSS by restricting script execution. Organizations should also ensure that anti-CSRF tokens are properly implemented in all forms and state-changing requests within their WooCommerce environment. Regular monitoring of logs for unusual activities related to booking changes or script injections is recommended. Finally, educating users and administrators about phishing and social engineering risks that could facilitate CSRF exploitation is important. Once a patch becomes available, prompt application and testing in staging environments before production deployment is critical.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-58991: CWE-352 Cross-Site Request Forgery (CSRF) in Cristiano Zanca WooCommerce Booking Bundle Hours
Description
Cross-Site Request Forgery (CSRF) vulnerability in Cristiano Zanca WooCommerce Booking Bundle Hours allows Stored XSS. This issue affects WooCommerce Booking Bundle Hours: from n/a through 0.7.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-58991 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the WooCommerce Booking Bundle Hours plugin developed by Cristiano Zanca, specifically versions up to 0.7.4. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent, leveraging the user's active session. The CSRF flaw is compounded by the presence of Stored Cross-Site Scripting (XSS), which means that malicious scripts can be persistently injected and executed in the context of the victim's browser. The CVSS 3.1 score of 7.1 indicates a high impact with network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The vulnerability affects confidentiality, integrity, and availability due to the ability to execute unauthorized commands and inject persistent scripts. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No patches or known exploits in the wild are currently reported, but the risk remains significant given the plugin’s integration with WooCommerce, a widely used e-commerce platform for WordPress. Attackers could exploit this vulnerability to manipulate booking data, inject malicious payloads, or disrupt service availability by exploiting the CSRF to perform actions like changing bookings or configurations, while the Stored XSS could be used for session hijacking or delivering further malware.
Potential Impact
For European organizations using WooCommerce with the Booking Bundle Hours plugin, this vulnerability poses a significant risk to e-commerce operations, customer trust, and data integrity. Exploitation could lead to unauthorized modification of booking information, financial fraud, or leakage of sensitive customer data. The Stored XSS aspect increases the risk of broader compromise through session hijacking or malware delivery, potentially affecting not only the website but also its users. Disruption of booking services can impact revenue and reputation, especially for businesses relying on online appointment or resource scheduling. Given the widespread adoption of WooCommerce in Europe, particularly among SMEs in retail, hospitality, and services sectors, the threat could have a broad operational and financial impact. Additionally, GDPR implications arise if personal data is compromised, leading to regulatory penalties and loss of customer confidence.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify the presence of the Booking Bundle Hours plugin and its version. Until an official patch is released, mitigation should include disabling or removing the vulnerable plugin to prevent exploitation. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attack patterns and suspicious POST requests targeting booking endpoints can reduce risk. Enforcing strict Content Security Policy (CSP) headers can help mitigate the impact of Stored XSS by restricting script execution. Organizations should also ensure that anti-CSRF tokens are properly implemented in all forms and state-changing requests within their WooCommerce environment. Regular monitoring of logs for unusual activities related to booking changes or script injections is recommended. Finally, educating users and administrators about phishing and social engineering risks that could facilitate CSRF exploitation is important. Once a patch becomes available, prompt application and testing in staging environments before production deployment is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-06T04:45:22.563Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c05927ffcb452a184a8c50
Added to database: 9/9/2025, 4:43:19 PM
Last enriched: 9/9/2025, 4:43:59 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 6
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.