Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8097: CWE-20 Improper Input Validation in xTemos Woodmart

0
Medium
VulnerabilityCVE-2025-8097cvecve-2025-8097cwe-20
Published: Sat Jul 26 2025 (07/26/2025, 06:43:22 UTC)
Source: CVE Database V5
Vendor/Project: xTemos
Product: Woodmart

Description

The WoodMart theme for WordPress is vulnerable to Improper Input Validation in all versions up to, and including, 8.2.6. This is due to insufficient validation of the qty parameter in the woodmart_update_cart_item function. This makes it possible for unauthenticated attackers to manipulate cart quantities using fractional values, allowing them to obtain products for free by setting extremely small quantities (e.g., 0.00001) that round cart totals to $0.00, effectively bypassing payment requirements and allowing unauthorized acquisition of virtual or downloadable products.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:49:00 UTC

Technical Analysis

CVE-2025-8097 is a vulnerability identified in the WoodMart theme for WordPress, affecting all versions up to and including 8.2.6. The root cause is improper input validation (CWE-20) of the 'qty' parameter within the woodmart_update_cart_item function. This parameter controls the quantity of items added to the shopping cart. Due to insufficient validation, attackers can supply fractional quantities (e.g., 0.00001) that the system processes incorrectly, causing the cart total to round down to zero dollars. This flaw enables unauthenticated attackers to bypass payment mechanisms and acquire virtual or downloadable products for free. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation and impact limited to integrity (unauthorized acquisition) without affecting confidentiality or availability. No patches or official fixes have been published yet, and no known exploits have been detected in the wild. The vulnerability highlights a critical failure in input validation logic within e-commerce functionality of the WoodMart theme, which could lead to financial losses and abuse of digital goods distribution.

Potential Impact

The primary impact of CVE-2025-8097 is financial loss due to unauthorized acquisition of virtual or downloadable products without payment. This undermines the integrity of the e-commerce transaction process and can lead to revenue loss for online merchants using the WoodMart theme. Since the vulnerability allows unauthenticated remote exploitation, attackers can automate abuse at scale, potentially affecting many stores. Although confidentiality and availability are not directly impacted, the trustworthiness of the affected e-commerce platform is compromised, potentially damaging brand reputation. Organizations may also face increased chargebacks or disputes if fraudulent transactions are detected. Additionally, widespread exploitation could disrupt digital product distribution channels and harm the broader WordPress e-commerce ecosystem. The lack of patches increases exposure time, and the absence of known exploits in the wild suggests a window for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-8097, organizations should immediately implement strict input validation and sanitization on the 'qty' parameter within the WoodMart theme's cart update functionality. Specifically, ensure that quantities are validated as positive integers and reject fractional or zero values before processing. Until an official patch is released, consider deploying web application firewall (WAF) rules to detect and block requests containing suspicious fractional quantity values. Monitor e-commerce transaction logs for anomalous cart quantities or zero-dollar transactions and implement alerting for potential abuse. Restrict access to cart update endpoints where possible and apply rate limiting to reduce automated exploitation attempts. Engage with the vendor (xTemos) to obtain or request a security patch and apply it promptly once available. Additionally, review and harden other input validation routines in the theme to prevent similar issues. Educate site administrators on monitoring and incident response specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-23T17:52:17.006Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68847d96ad5a09ad005c240e

Added to database: 7/26/2025, 7:02:46 AM

Last enriched: 2/26/2026, 4:49:00 PM

Last updated: 3/21/2026, 3:58:12 AM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses