Skip to main content

CVE-2025-8102: CWE-352 Cross-Site Request Forgery (CSRF) in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

Medium
VulnerabilityCVE-2025-8102cvecve-2025-8102cwe-352
Published: Wed Aug 20 2025 (08/20/2025, 11:26:09 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

Description

The Easy Digital Downloads plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.5.0. This is due to missing nonce validations in the edd_sendwp_disconnect() and edd_sendwp_remote_install() functions. This makes it possible for unauthenticated attackers to deactivate or download and activate the SendWP plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 08/20/2025, 11:47:46 UTC

Technical Analysis

CVE-2025-8102 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Easy Digital Downloads (EDD) WordPress plugin, specifically versions up to and including 3.5.0. The vulnerability arises due to missing nonce validations in two key functions: edd_sendwp_disconnect() and edd_sendwp_remote_install(). Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source and to prevent unauthorized actions. The absence of nonce checks means that an attacker can craft malicious requests that, when executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), can trigger unintended actions on the site. In this case, the attacker can cause the site to deactivate the SendWP plugin or download and activate it without the administrator's consent. Since these actions can affect the functionality and security posture of the site, the vulnerability can lead to integrity and availability impacts. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (the administrator must be tricked into performing the action). The vulnerability does not impact confidentiality directly but can degrade site integrity and availability by manipulating plugin states. No known exploits are currently reported in the wild, and no official patches are linked yet, indicating that mitigation relies on awareness and cautious administrative behavior for now.

Potential Impact

For European organizations using the Easy Digital Downloads plugin on WordPress sites, this vulnerability poses a moderate risk. Many eCommerce and subscription-based businesses rely on EDD for digital product sales and payment processing. An attacker exploiting this vulnerability could disrupt business operations by disabling critical plugins or installing unauthorized plugins, potentially leading to service downtime or degraded functionality. While direct data theft is not indicated, the ability to manipulate plugin states could be leveraged as a foothold for further attacks or to introduce malicious code. This is particularly concerning for organizations handling sensitive customer data or payment information under GDPR regulations, as service interruptions or unauthorized changes could lead to compliance issues and reputational damage. The requirement for user interaction (administrator action) somewhat limits the attack surface but does not eliminate risk, especially in environments with less stringent user security awareness or where administrators frequently access untrusted content.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the Easy Digital Downloads plugin is in use and confirm the version. Until an official patch is released, administrators should avoid clicking on unsolicited links or visiting untrusted websites while logged into WordPress admin accounts. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help reduce CSRF risks by restricting cross-origin requests. Additionally, organizations should consider temporarily restricting administrative access to trusted IP addresses or using multi-factor authentication (MFA) to reduce the risk of compromised admin sessions. Monitoring plugin activity logs for unexpected deactivations or activations can provide early detection of exploitation attempts. Once a patch becomes available, prompt updating of the plugin is critical. Finally, educating administrators about the risks of CSRF and safe browsing practices is essential to mitigate the user interaction requirement of this attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-23T20:45:30.551Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5b270ad5a09ad00043f75

Added to database: 8/20/2025, 11:33:04 AM

Last enriched: 8/20/2025, 11:47:46 AM

Last updated: 8/22/2025, 12:01:26 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats