CVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce Product Search for WooCommerce premmerce-search allows Cross Site Request Forgery.This issue affects Premmerce Product Search for WooCommerce: from n/a through <= 2.2.4.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-64290 is a Cross-Site Request Forgery (CSRF) flaw in the Premmerce Product Search plugin for WooCommerce, affecting versions up to and including 2.2.4. CSRF vulnerabilities allow attackers to induce authenticated users to execute unwanted actions on a web application in which they are currently authenticated. In this case, an attacker can craft malicious requests that, when visited by a logged-in user with sufficient privileges, cause the WooCommerce plugin to perform unintended operations, potentially altering product search configurations or other plugin-managed settings. The vulnerability arises because the plugin fails to implement proper anti-CSRF tokens or other verification mechanisms to validate the legitimacy of requests. No CVSS score has been assigned yet, and no public exploits have been reported, but the risk remains significant due to the nature of CSRF attacks and the widespread use of WooCommerce in e-commerce platforms. The plugin is widely used in WordPress-based online stores, which are common in Europe. Attackers do not require user interaction beyond the victim visiting a malicious URL or webpage, and the attack scope includes any authenticated user capable of triggering the vulnerable functionality. This vulnerability could be leveraged to disrupt e-commerce operations, manipulate product search behavior, or degrade user trust. The lack of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Product Search plugin, this vulnerability poses a risk of unauthorized actions being performed without user consent. Potential impacts include manipulation of product search settings, disruption of customer experience, and possible degradation of sales or brand reputation. Since WooCommerce is widely adopted across Europe, particularly in countries with mature e-commerce markets, the risk is non-trivial. Attackers exploiting this vulnerability could cause operational disruptions or facilitate further attacks by altering site behavior. The confidentiality impact is limited as CSRF primarily affects integrity and availability by enabling unauthorized state changes. However, if combined with other vulnerabilities, it could contribute to a broader compromise. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits once the vulnerability is public. Organizations failing to address this issue may face increased exposure to targeted attacks or automated exploitation attempts.
Mitigation Recommendations
1. Monitor for and apply official patches from Premmerce as soon as they are released to address CVE-2025-64290. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin endpoints. 3. Enforce strict SameSite cookie attributes (e.g., SameSite=Lax or Strict) on authentication cookies to reduce CSRF risk. 4. Temporarily disable or restrict access to the Premmerce Product Search plugin functionality for non-administrative users until a patch is available. 5. Conduct a thorough review of user roles and permissions in WordPress to minimize the number of users with privileges that could be exploited via CSRF. 6. Educate users and administrators about the risks of clicking on untrusted links while authenticated to the WooCommerce site. 7. Consider implementing additional CSRF tokens or nonce verification in custom code or via security plugins as an interim protective measure. 8. Regularly audit logs for unusual activity related to the plugin to detect potential exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
Description
Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce Product Search for WooCommerce premmerce-search allows Cross Site Request Forgery.This issue affects Premmerce Product Search for WooCommerce: from n/a through <= 2.2.4.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-64290 is a Cross-Site Request Forgery (CSRF) flaw in the Premmerce Product Search plugin for WooCommerce, affecting versions up to and including 2.2.4. CSRF vulnerabilities allow attackers to induce authenticated users to execute unwanted actions on a web application in which they are currently authenticated. In this case, an attacker can craft malicious requests that, when visited by a logged-in user with sufficient privileges, cause the WooCommerce plugin to perform unintended operations, potentially altering product search configurations or other plugin-managed settings. The vulnerability arises because the plugin fails to implement proper anti-CSRF tokens or other verification mechanisms to validate the legitimacy of requests. No CVSS score has been assigned yet, and no public exploits have been reported, but the risk remains significant due to the nature of CSRF attacks and the widespread use of WooCommerce in e-commerce platforms. The plugin is widely used in WordPress-based online stores, which are common in Europe. Attackers do not require user interaction beyond the victim visiting a malicious URL or webpage, and the attack scope includes any authenticated user capable of triggering the vulnerable functionality. This vulnerability could be leveraged to disrupt e-commerce operations, manipulate product search behavior, or degrade user trust. The lack of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Product Search plugin, this vulnerability poses a risk of unauthorized actions being performed without user consent. Potential impacts include manipulation of product search settings, disruption of customer experience, and possible degradation of sales or brand reputation. Since WooCommerce is widely adopted across Europe, particularly in countries with mature e-commerce markets, the risk is non-trivial. Attackers exploiting this vulnerability could cause operational disruptions or facilitate further attacks by altering site behavior. The confidentiality impact is limited as CSRF primarily affects integrity and availability by enabling unauthorized state changes. However, if combined with other vulnerabilities, it could contribute to a broader compromise. The absence of known exploits reduces immediate risk but does not eliminate it, as attackers may develop exploits once the vulnerability is public. Organizations failing to address this issue may face increased exposure to targeted attacks or automated exploitation attempts.
Mitigation Recommendations
1. Monitor for and apply official patches from Premmerce as soon as they are released to address CVE-2025-64290. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting the plugin endpoints. 3. Enforce strict SameSite cookie attributes (e.g., SameSite=Lax or Strict) on authentication cookies to reduce CSRF risk. 4. Temporarily disable or restrict access to the Premmerce Product Search plugin functionality for non-administrative users until a patch is available. 5. Conduct a thorough review of user roles and permissions in WordPress to minimize the number of users with privileges that could be exploited via CSRF. 6. Educate users and administrators about the risks of clicking on untrusted links while authenticated to the WooCommerce site. 7. Consider implementing additional CSRF tokens or nonce verification in custom code or via security plugins as an interim protective measure. 8. Regularly audit logs for unusual activity related to the plugin to detect potential exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-29T03:29:08.850Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6901d66086d093201c2b6245
Added to database: 10/29/2025, 8:54:56 AM
Last enriched: 10/29/2025, 9:09:55 AM
Last updated: 10/29/2025, 10:23:10 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.