Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62080: CWE-352 Cross-Site Request Forgery (CSRF) in Channelize.io Team Live Shopping & Shoppable Videos For WooCommerce

0
Medium
VulnerabilityCVE-2025-62080cvecve-2025-62080cwe-352
Published: Wed Dec 31 2025 (12/31/2025, 15:44:45 UTC)
Source: CVE Database V5
Vendor/Project: Channelize.io Team
Product: Live Shopping & Shoppable Videos For WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Channelize.Io Team Live Shopping & Shoppable Videos For WooCommerce allows Cross Site Request Forgery.This issue affects Live Shopping & Shoppable Videos For WooCommerce: from n/a through 2.2.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:18:30 UTC

Technical Analysis

CVE-2025-62080 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Channelize.io Team Live Shopping & Shoppable Videos plugin for WooCommerce, affecting versions up to 2.2.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their consent, exploiting the user's active session. In this case, the vulnerability allows unauthorized commands to be executed on behalf of the user, potentially altering data or performing actions within the WooCommerce live shopping environment. The CVSS 3.1 base score is 4.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N. This means the attack can be performed remotely over the network without privileges but requires user interaction, and it impacts integrity slightly without affecting confidentiality or availability. The plugin is used to integrate live shopping and shoppable video features into WooCommerce stores, which are popular in e-commerce. The lack of patch links suggests no official fix has been released yet, and no known exploits have been observed in the wild. The vulnerability stems from missing or inadequate anti-CSRF protections such as tokens or origin checks, allowing attackers to craft malicious web pages that cause users to unknowingly submit requests that modify the application state. This can lead to unauthorized changes in shopping carts, orders, or other live shopping interactions, undermining data integrity and trust in the e-commerce platform.

Potential Impact

For European organizations, particularly those operating e-commerce platforms using WooCommerce with the Channelize.io plugin, this vulnerability could lead to unauthorized actions performed on their websites by tricking authenticated users. Although the impact on confidentiality and availability is negligible, the integrity of transactional data or user interactions may be compromised, potentially causing financial discrepancies, customer dissatisfaction, or reputational damage. Given the plugin’s role in live shopping and shoppable videos, attackers might manipulate orders or shopping sessions, disrupting business operations. The medium severity and requirement for user interaction limit the scope of impact, but organizations with high traffic and active user sessions are at greater risk. Additionally, the absence of a patch increases exposure time. European e-commerce businesses that rely heavily on interactive shopping experiences may face operational challenges and customer trust issues if exploited.

Mitigation Recommendations

Organizations should immediately review their use of the Channelize.io Live Shopping & Shoppable Videos plugin and monitor for updates or patches from the vendor. In the absence of an official patch, implement web application firewall (WAF) rules to detect and block suspicious CSRF attempts by validating the Referer and Origin headers. Developers should add or enforce anti-CSRF tokens in all state-changing requests within the plugin’s codebase. Additionally, limit the lifetime of user sessions and require re-authentication for sensitive actions to reduce the risk window. Conduct security testing and code reviews focusing on CSRF protections in the plugin and related WooCommerce components. Educate users about the risks of interacting with untrusted websites while logged into e-commerce platforms. Finally, maintain robust logging and monitoring to detect unusual activity that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-07T15:34:50.699Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955483edb813ff03ef16429

Added to database: 12/31/2025, 3:58:54 PM

Last enriched: 1/20/2026, 10:18:30 PM

Last updated: 2/7/2026, 11:53:32 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats