CVE-2025-8198: CWE-472 External Control of Assumed-Immutable Web Parameter in ThemeMove MinimogWP – The High Converting eCommerce WordPress Theme
The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.
AI Analysis
Technical Summary
CVE-2025-8198 is a high-severity vulnerability affecting the MinimogWP WordPress theme, a popular eCommerce theme developed by ThemeMove. The vulnerability arises from insufficient validation of quantity values when users modify item quantities in the shopping cart. Specifically, unauthenticated attackers can manipulate the quantity parameter to fractional values, which the theme incorrectly processes, resulting in price manipulation. This flaw allows attackers to add items to the cart and set fractional quantities, causing the total price to be calculated incorrectly and potentially allowing purchases at reduced prices or free items. The vulnerability is present in all versions of MinimogWP up to and including version 3.9.0. Notably, exploitation requires no authentication or user interaction, and the attack vector is remote (network accessible). However, the vulnerability is mitigated if WooCommerce version 9.8.2 or later is installed, as those versions presumably include fixes or validation that prevent fractional quantity exploitation. The underlying weakness is classified under CWE-472, which refers to external control of an assumed-immutable web parameter, indicating that the theme assumes the quantity parameter is trustworthy and immutable, but it is externally controllable and not properly validated. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation, lack of required privileges, and the significant impact on integrity (price manipulation). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet, suggesting that users should apply mitigations or updates promptly once available.
Potential Impact
For European organizations operating eCommerce websites using the MinimogWP theme, this vulnerability poses a significant financial risk. Attackers can manipulate prices to purchase goods at incorrect prices, potentially causing direct revenue loss and undermining customer trust. The integrity of transaction data is compromised, which can also affect inventory management and financial reporting. Since the attack requires no authentication, it can be exploited by any internet user, increasing the risk of widespread abuse. This can lead to increased chargebacks, disputes, and reputational damage. Additionally, if attackers exploit this vulnerability at scale, it may disrupt normal business operations and cause downstream effects on supply chains and customer satisfaction. Organizations in Europe must consider compliance with GDPR and other regulations, as financial fraud and data integrity issues could trigger regulatory scrutiny. The fact that the vulnerability is mitigated by WooCommerce 9.8.2+ means that organizations using older WooCommerce versions alongside MinimogWP are at higher risk. Given the popularity of WordPress and WooCommerce in Europe, especially among small and medium-sized enterprises, the threat is material and requires urgent attention.
Mitigation Recommendations
1. Immediate upgrade to WooCommerce version 9.8.2 or later if using the MinimogWP theme, as this version includes protections against fractional quantity manipulation. 2. If upgrading WooCommerce is not immediately feasible, implement server-side validation to reject fractional or otherwise invalid quantity values in the cart. This can be done by adding custom validation hooks in WordPress to enforce integer-only quantities. 3. Monitor shopping cart transactions for anomalous fractional quantities or unusual purchase patterns that could indicate exploitation attempts. 4. Limit exposure by restricting access to the cart modification endpoints via web application firewalls (WAF) or rate limiting to reduce automated exploitation attempts. 5. Keep the MinimogWP theme updated and monitor ThemeMove’s official channels for patches addressing this vulnerability directly. 6. Conduct regular security audits and penetration testing focused on eCommerce transaction integrity. 7. Educate staff and customers about potential fraud indicators and ensure incident response plans are in place to quickly address suspected exploitation. 8. Consider deploying additional integrity checks on order processing systems to detect and flag suspicious orders for manual review.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8198: CWE-472 External Control of Assumed-Immutable Web Parameter in ThemeMove MinimogWP – The High Converting eCommerce WordPress Theme
Description
The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.
AI-Powered Analysis
Technical Analysis
CVE-2025-8198 is a high-severity vulnerability affecting the MinimogWP WordPress theme, a popular eCommerce theme developed by ThemeMove. The vulnerability arises from insufficient validation of quantity values when users modify item quantities in the shopping cart. Specifically, unauthenticated attackers can manipulate the quantity parameter to fractional values, which the theme incorrectly processes, resulting in price manipulation. This flaw allows attackers to add items to the cart and set fractional quantities, causing the total price to be calculated incorrectly and potentially allowing purchases at reduced prices or free items. The vulnerability is present in all versions of MinimogWP up to and including version 3.9.0. Notably, exploitation requires no authentication or user interaction, and the attack vector is remote (network accessible). However, the vulnerability is mitigated if WooCommerce version 9.8.2 or later is installed, as those versions presumably include fixes or validation that prevent fractional quantity exploitation. The underlying weakness is classified under CWE-472, which refers to external control of an assumed-immutable web parameter, indicating that the theme assumes the quantity parameter is trustworthy and immutable, but it is externally controllable and not properly validated. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation, lack of required privileges, and the significant impact on integrity (price manipulation). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet, suggesting that users should apply mitigations or updates promptly once available.
Potential Impact
For European organizations operating eCommerce websites using the MinimogWP theme, this vulnerability poses a significant financial risk. Attackers can manipulate prices to purchase goods at incorrect prices, potentially causing direct revenue loss and undermining customer trust. The integrity of transaction data is compromised, which can also affect inventory management and financial reporting. Since the attack requires no authentication, it can be exploited by any internet user, increasing the risk of widespread abuse. This can lead to increased chargebacks, disputes, and reputational damage. Additionally, if attackers exploit this vulnerability at scale, it may disrupt normal business operations and cause downstream effects on supply chains and customer satisfaction. Organizations in Europe must consider compliance with GDPR and other regulations, as financial fraud and data integrity issues could trigger regulatory scrutiny. The fact that the vulnerability is mitigated by WooCommerce 9.8.2+ means that organizations using older WooCommerce versions alongside MinimogWP are at higher risk. Given the popularity of WordPress and WooCommerce in Europe, especially among small and medium-sized enterprises, the threat is material and requires urgent attention.
Mitigation Recommendations
1. Immediate upgrade to WooCommerce version 9.8.2 or later if using the MinimogWP theme, as this version includes protections against fractional quantity manipulation. 2. If upgrading WooCommerce is not immediately feasible, implement server-side validation to reject fractional or otherwise invalid quantity values in the cart. This can be done by adding custom validation hooks in WordPress to enforce integer-only quantities. 3. Monitor shopping cart transactions for anomalous fractional quantities or unusual purchase patterns that could indicate exploitation attempts. 4. Limit exposure by restricting access to the cart modification endpoints via web application firewalls (WAF) or rate limiting to reduce automated exploitation attempts. 5. Keep the MinimogWP theme updated and monitor ThemeMove’s official channels for patches addressing this vulnerability directly. 6. Conduct regular security audits and penetration testing focused on eCommerce transaction integrity. 7. Educate staff and customers about potential fraud indicators and ensure incident response plans are in place to quickly address suspected exploitation. 8. Consider deploying additional integrity checks on order processing systems to detect and flag suspicious orders for manual review.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-25T16:26:50.958Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688573fcad5a09ad006b9cc1
Added to database: 7/27/2025, 12:34:04 AM
Last enriched: 7/27/2025, 12:34:14 AM
Last updated: 7/31/2025, 12:34:33 AM
Views: 11
Related Threats
CVE-2025-8368: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-53558: Use of weak credentials in ZTE Japan. K.K. ZXHN-F660T
HighCVE-2025-8367: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-8366: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-7847: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.