Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6214: CWE-352 Cross-Site Request Forgery (CSRF) in omnishop Omnishop – Mobile shop apps complementing your WooCommerce webshop

0
Medium
VulnerabilityCVE-2025-6214cvecve-2025-6214cwe-352
Published: Wed Jul 23 2025 (07/23/2025, 02:24:39 UTC)
Source: CVE Database V5
Vendor/Project: omnishop
Product: Omnishop – Mobile shop apps complementing your WooCommerce webshop

Description

The Omnishop plugin for WordPress is vulnerable to Cross-Site Request Forgery on its /users/delete REST route in all versions up to, and including, 1.0.9. The route’s permission_callback only verifies that the requester is logged in, but fails to require any nonce or other proof of intent. This makes it possible for unauthenticated attackers to delete arbitrary user accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 16:07:53 UTC

Technical Analysis

CVE-2025-6214 is a CSRF vulnerability identified in the Omnishop plugin for WordPress, which complements WooCommerce webshops by providing mobile shop app functionality. The vulnerability resides in the /users/delete REST API endpoint, which is intended to allow deletion of user accounts. The endpoint's permission_callback only verifies that the requester is logged in, without requiring a nonce or other anti-CSRF tokens to confirm the user's intent. This design flaw enables an attacker to craft a malicious web page or email containing a forged request that, when visited or clicked by an authenticated site administrator, triggers the deletion of arbitrary user accounts without their explicit consent. The vulnerability affects all versions of Omnishop up to and including 1.0.9. The CVSS 3.1 base score is 6.5, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Although no public exploits have been reported, the vulnerability poses a significant risk to the integrity of user data and administrative control within affected WooCommerce webshops. The lack of nonce or CSRF token validation is a critical oversight in the REST route's security design, making it susceptible to social engineering attacks targeting logged-in administrators.

Potential Impact

The primary impact of this vulnerability is on the integrity of user accounts within WooCommerce webshops using the Omnishop plugin. Successful exploitation allows attackers to delete arbitrary user accounts, potentially including administrators or privileged users, which can disrupt business operations and lead to loss of administrative control. While confidentiality and availability are not directly affected, the deletion of user accounts can cause significant operational disruption and loss of trust. Organizations relying on Omnishop for mobile shop app integration face risks of unauthorized account deletions, which could lead to customer dissatisfaction, loss of sales, and reputational damage. The attack requires user interaction (an administrator clicking a malicious link), so social engineering is a key factor. The vulnerability's network attack vector and lack of required privileges increase the risk of exploitation in environments where administrators access the webshop from untrusted networks or devices. Although no known exploits exist yet, the vulnerability is likely to attract attackers due to the potential for administrative disruption.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement the following measures: 1) Update the Omnishop plugin to a patched version once available that includes proper nonce or anti-CSRF token validation on the /users/delete REST route. 2) In the interim, restrict access to the REST API endpoints by limiting administrative access to trusted networks or VPNs. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests to the /users/delete endpoint originating from external or untrusted sources. 4) Educate administrators about the risks of clicking unknown or suspicious links, especially when logged into the webshop backend. 5) Monitor logs for unusual user deletion activity and implement alerting for unexpected account deletions. 6) Consider implementing multi-factor authentication (MFA) for administrative accounts to reduce the risk of session hijacking or unauthorized access. 7) Review and harden REST API permissions and callbacks to ensure all sensitive actions require explicit proof of intent such as nonces or tokens. These steps will reduce the attack surface and help prevent exploitation until a vendor patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-17T21:08:02.919Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68804d50ad5a09ad00065fe1

Added to database: 7/23/2025, 2:47:44 AM

Last enriched: 2/27/2026, 4:07:53 PM

Last updated: 3/24/2026, 1:11:24 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses