Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62890: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Brands for WooCommerce

0
High
VulnerabilityCVE-2025-62890cvecve-2025-62890
Published: Mon Oct 27 2025 (10/27/2025, 01:33:46 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce Brands for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce Brands for WooCommerce premmerce-woocommerce-brands allows Cross Site Request Forgery.This issue affects Premmerce Brands for WooCommerce: from n/a through <= 1.2.13.

AI-Powered Analysis

AILast updated: 11/13/2025, 12:15:12 UTC

Technical Analysis

CVE-2025-62890 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Premmerce Brands for WooCommerce plugin, affecting all versions up to 1.2.13. CSRF vulnerabilities occur when a web application does not properly verify that requests to perform state-changing actions originate from legitimate users, allowing attackers to trick authenticated users into executing unintended commands. In this case, the Premmerce plugin lacks adequate CSRF tokens or validation mechanisms on critical actions, enabling remote attackers to craft malicious web requests that, when visited by an authenticated user (such as an administrator), can alter brand data, configurations, or other sensitive settings within the WooCommerce environment. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that the attack can be performed remotely over the network without privileges but requires user interaction (the victim must visit a malicious link). The impact is severe, affecting confidentiality (exposure or alteration of brand data), integrity (unauthorized changes to e-commerce settings), and availability (potential disruption of services). No public exploits have been reported yet, but the vulnerability's characteristics make it a high-risk issue for e-commerce sites relying on this plugin. The vulnerability was reserved and published in late October 2025, with no patches currently linked, emphasizing the need for immediate attention from site administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk to e-commerce platforms using WooCommerce with the Premmerce Brands plugin. Successful exploitation could lead to unauthorized modification or deletion of brand information, potentially disrupting product listings and customer trust. Confidential data related to brands or configurations could be exposed or altered, impacting business operations and compliance with data protection regulations such as GDPR. The integrity of the e-commerce platform could be compromised, leading to financial losses, reputational damage, and potential legal consequences. Additionally, availability could be affected if attackers manipulate settings to disrupt service. Given the widespread use of WooCommerce in Europe, especially in countries with mature e-commerce markets, this vulnerability could have broad implications if not addressed promptly.

Mitigation Recommendations

1. Immediately monitor for updates or patches from Premmerce and apply them as soon as they are released. 2. In the absence of an official patch, implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the Premmerce plugin endpoints. 3. Restrict administrative access to trusted IP addresses and enforce strong multi-factor authentication (MFA) to reduce the risk of session hijacking or unauthorized access. 4. Educate administrators and users with elevated privileges about the risks of clicking on untrusted links while logged into the WooCommerce admin panel. 5. Review and harden WooCommerce and WordPress security configurations, including disabling unnecessary plugins and ensuring all components are up to date. 6. Consider implementing Content Security Policy (CSP) headers to reduce the risk of malicious script execution. 7. Regularly audit logs for unusual activity related to brand management or configuration changes. 8. If feasible, temporarily disable the Premmerce Brands plugin until a secure version is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:16.560Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed02e23a7bbed324acb40

Added to database: 10/27/2025, 1:51:42 AM

Last enriched: 11/13/2025, 12:15:12 PM

Last updated: 12/15/2025, 4:38:40 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats