CVE-2025-8198: CWE-472 External Control of Assumed-Immutable Web Parameter in ThemeMove MinimogWP – The High Converting eCommerce WordPress Theme
The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.
AI Analysis
Technical Summary
CVE-2025-8198 is a high-severity vulnerability affecting the MinimogWP WordPress theme, a popular eCommerce theme developed by ThemeMove. The vulnerability arises from insufficient validation of quantity values when users modify item quantities in the shopping cart. Specifically, unauthenticated attackers can manipulate the quantity parameter to fractional values, which the theme incorrectly processes, resulting in price manipulation. This flaw allows attackers to add items to the cart and adjust quantities to fractional amounts, causing the total price to be calculated incorrectly and potentially allowing purchases at significantly reduced prices or even free. The vulnerability is rooted in CWE-472, which involves external control of an assumed-immutable web parameter, indicating that the theme trusts client-supplied quantity values without proper validation or sanitization. Notably, exploitation does not require authentication or user interaction, increasing the risk of automated attacks. However, the vulnerability cannot be exploited if the WooCommerce plugin version 9.8.2 or later is installed, as that version presumably includes fixes or mitigations that prevent fractional quantity manipulation. The CVSS v3.1 base score is 7.5, reflecting a high impact on integrity due to price manipulation, with no impact on confidentiality or availability. There are no known exploits in the wild at the time of publication, and no official patches for the theme have been linked yet. The vulnerability affects all versions of MinimogWP up to and including 3.9.0, which is the latest known version at the time of disclosure.
Potential Impact
For European organizations running eCommerce websites using the MinimogWP theme, this vulnerability poses a significant financial risk. Attackers can exploit the flaw to purchase goods at manipulated prices, leading to direct revenue loss and potential inventory depletion. Since the vulnerability can be exploited without authentication or user interaction, automated attacks or bots could rapidly exploit the flaw at scale. This could also damage customer trust if manipulated transactions are detected or if attackers use the vulnerability to disrupt normal sales operations. Additionally, organizations may face reputational damage and regulatory scrutiny under GDPR if the vulnerability leads to fraudulent transactions or impacts customer data indirectly. The inability to exploit the vulnerability when WooCommerce 9.8.2+ is installed suggests that organizations using older WooCommerce versions alongside MinimogWP are at higher risk. Given the widespread use of WordPress and WooCommerce in Europe’s eCommerce sector, the vulnerability could affect small to medium enterprises that rely on this theme for their online stores. The impact is primarily on the integrity of transaction data and financial loss rather than on confidentiality or availability.
Mitigation Recommendations
European organizations should immediately verify their WooCommerce plugin version and upgrade to 9.8.2 or later if not already done, as this version mitigates the vulnerability. Additionally, organizations should update the MinimogWP theme to the latest version once a patch addressing CVE-2025-8198 is released by ThemeMove. Until a patch is available, organizations can implement server-side validation to reject fractional quantity values in cart requests, ensuring only integer quantities are accepted. Web application firewalls (WAFs) can be configured to detect and block requests containing fractional quantity parameters. Monitoring and logging cart modification requests for anomalous fractional values can help detect attempted exploitation. Organizations should also consider temporarily disabling the MinimogWP theme or switching to an alternative theme if immediate patching is not feasible. Regular security audits and penetration testing focusing on eCommerce transaction integrity are recommended to identify similar issues. Finally, educating development and operations teams about the risks of trusting client-side parameters will help prevent similar vulnerabilities in the future.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8198: CWE-472 External Control of Assumed-Immutable Web Parameter in ThemeMove MinimogWP – The High Converting eCommerce WordPress Theme
Description
The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.
AI-Powered Analysis
Technical Analysis
CVE-2025-8198 is a high-severity vulnerability affecting the MinimogWP WordPress theme, a popular eCommerce theme developed by ThemeMove. The vulnerability arises from insufficient validation of quantity values when users modify item quantities in the shopping cart. Specifically, unauthenticated attackers can manipulate the quantity parameter to fractional values, which the theme incorrectly processes, resulting in price manipulation. This flaw allows attackers to add items to the cart and adjust quantities to fractional amounts, causing the total price to be calculated incorrectly and potentially allowing purchases at significantly reduced prices or even free. The vulnerability is rooted in CWE-472, which involves external control of an assumed-immutable web parameter, indicating that the theme trusts client-supplied quantity values without proper validation or sanitization. Notably, exploitation does not require authentication or user interaction, increasing the risk of automated attacks. However, the vulnerability cannot be exploited if the WooCommerce plugin version 9.8.2 or later is installed, as that version presumably includes fixes or mitigations that prevent fractional quantity manipulation. The CVSS v3.1 base score is 7.5, reflecting a high impact on integrity due to price manipulation, with no impact on confidentiality or availability. There are no known exploits in the wild at the time of publication, and no official patches for the theme have been linked yet. The vulnerability affects all versions of MinimogWP up to and including 3.9.0, which is the latest known version at the time of disclosure.
Potential Impact
For European organizations running eCommerce websites using the MinimogWP theme, this vulnerability poses a significant financial risk. Attackers can exploit the flaw to purchase goods at manipulated prices, leading to direct revenue loss and potential inventory depletion. Since the vulnerability can be exploited without authentication or user interaction, automated attacks or bots could rapidly exploit the flaw at scale. This could also damage customer trust if manipulated transactions are detected or if attackers use the vulnerability to disrupt normal sales operations. Additionally, organizations may face reputational damage and regulatory scrutiny under GDPR if the vulnerability leads to fraudulent transactions or impacts customer data indirectly. The inability to exploit the vulnerability when WooCommerce 9.8.2+ is installed suggests that organizations using older WooCommerce versions alongside MinimogWP are at higher risk. Given the widespread use of WordPress and WooCommerce in Europe’s eCommerce sector, the vulnerability could affect small to medium enterprises that rely on this theme for their online stores. The impact is primarily on the integrity of transaction data and financial loss rather than on confidentiality or availability.
Mitigation Recommendations
European organizations should immediately verify their WooCommerce plugin version and upgrade to 9.8.2 or later if not already done, as this version mitigates the vulnerability. Additionally, organizations should update the MinimogWP theme to the latest version once a patch addressing CVE-2025-8198 is released by ThemeMove. Until a patch is available, organizations can implement server-side validation to reject fractional quantity values in cart requests, ensuring only integer quantities are accepted. Web application firewalls (WAFs) can be configured to detect and block requests containing fractional quantity parameters. Monitoring and logging cart modification requests for anomalous fractional values can help detect attempted exploitation. Organizations should also consider temporarily disabling the MinimogWP theme or switching to an alternative theme if immediate patching is not feasible. Regular security audits and penetration testing focusing on eCommerce transaction integrity are recommended to identify similar issues. Finally, educating development and operations teams about the risks of trusting client-side parameters will help prevent similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-25T16:26:50.958Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688573fcad5a09ad006b9cc1
Added to database: 7/27/2025, 12:34:04 AM
Last enriched: 8/3/2025, 1:02:16 AM
Last updated: 9/11/2025, 8:34:02 PM
Views: 36
Related Threats
CVE-2025-10298
LowCVE-2025-4974
LowCVE-2025-10319: Improper Authorization in JeecgBoot
MediumCVE-2025-55996: n/a
MediumCVE-2025-10321: Information Disclosure in Wavlink WL-WN578W2
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.