Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce

0
Medium
VulnerabilityCVE-2025-64290cvecve-2025-64290
Published: Wed Oct 29 2025 (10/29/2025, 08:38:15 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce Product Search for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce Product Search for WooCommerce premmerce-search allows Cross Site Request Forgery.This issue affects Premmerce Product Search for WooCommerce: from n/a through <= 2.2.4.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:00:00 UTC

Technical Analysis

CVE-2025-64290 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Premmerce Product Search plugin for WooCommerce, affecting all versions up to and including 2.2.4. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application without their consent. In this case, the Premmerce plugin does not adequately verify the origin of requests, enabling attackers to craft malicious web pages or links that, when visited by an authenticated WooCommerce administrator or user, trigger unintended plugin operations. The vulnerability is remotely exploitable over the network without requiring prior authentication but does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The CVSS 3.1 base score of 4.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), limited confidentiality impact (C:L), and no integrity or availability impact (I:N/A:N). This suggests that while the vulnerability can leak some confidential information or cause minor unauthorized actions, it does not allow direct modification or disruption of the system. No public exploits are currently known, and no patches are linked yet, but the vulnerability is officially published and should be addressed promptly. The plugin is widely used in WooCommerce-based e-commerce sites, which are popular in Europe, making this a relevant risk for European online retailers.

Potential Impact

For European organizations, especially e-commerce businesses using WooCommerce with the Premmerce Product Search plugin, this vulnerability poses a risk of unauthorized actions being performed on their websites without their consent. While the impact is limited to confidentiality and does not affect data integrity or availability, attackers could potentially manipulate search parameters or leak sensitive configuration details. This could lead to information disclosure or minor disruptions in user experience, potentially undermining customer trust. Given the widespread use of WooCommerce in Europe, particularly in countries with large e-commerce markets such as Germany, the UK, France, and the Netherlands, the threat could affect a significant number of online stores. Additionally, the vulnerability could be leveraged as part of a broader attack chain, such as phishing campaigns targeting administrators to gain further access. The medium severity rating indicates that while the threat is not critical, it should not be ignored, especially in sectors where data confidentiality is paramount, such as retail, finance, and healthcare e-commerce platforms.

Mitigation Recommendations

To mitigate CVE-2025-64290, European organizations should take several specific steps beyond generic advice: 1) Immediately monitor for updates or patches from Premmerce and apply them as soon as they become available to ensure the vulnerability is fully remediated. 2) Implement or verify the presence of anti-CSRF tokens in all forms and state-changing requests related to the Premmerce plugin to prevent unauthorized request forgery. 3) Restrict administrative access to the WooCommerce backend using IP whitelisting or VPNs to reduce exposure to CSRF attacks. 4) Educate administrators and users about the risks of phishing and social engineering attacks that could trick them into clicking malicious links. 5) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting WooCommerce plugins. 6) Regularly audit plugin usage and permissions to ensure only necessary users have access to sensitive functions. 7) Consider disabling or limiting the use of the Premmerce Product Search plugin if it is not essential, until a secure version is deployed. These targeted measures will reduce the attack surface and help prevent exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:29:08.850Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6901d66086d093201c2b6245

Added to database: 10/29/2025, 8:54:56 AM

Last enriched: 1/21/2026, 12:00:00 AM

Last updated: 2/4/2026, 10:53:40 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats