Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8198: CWE-472 External Control of Assumed-Immutable Web Parameter in ThemeMove MinimogWP – The High Converting eCommerce WordPress Theme

0
High
VulnerabilityCVE-2025-8198cvecve-2025-8198cwe-472
Published: Sat Jul 26 2025 (07/26/2025, 05:45:53 UTC)
Source: CVE Database V5
Vendor/Project: ThemeMove
Product: MinimogWP – The High Converting eCommerce WordPress Theme

Description

The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:54:49 UTC

Technical Analysis

CVE-2025-8198 is a vulnerability classified under CWE-472 (External Control of Assumed-Immutable Web Parameter) affecting the MinimogWP WordPress theme, widely used for eCommerce websites. The flaw arises from insufficient validation of quantity values when users modify item quantities in the shopping cart. Specifically, the theme allows unauthenticated attackers to submit fractional quantity values, which are not properly checked or sanitized. This leads to price manipulation because the pricing logic calculates totals based on these fractional quantities, potentially allowing attackers to pay less than the intended price or exploit pricing logic for financial gain. The vulnerability affects all versions of MinimogWP up to and including 3.9.0. However, the vulnerability cannot be exploited if WooCommerce version 9.8.2 or later is installed, as that version presumably includes validation or mitigation controls that prevent fractional quantities from affecting pricing. The CVSS v3.1 score is 7.5 (high), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts data integrity (price manipulation) without affecting confidentiality or availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to eCommerce sites relying on this theme without the required WooCommerce version. The root cause is the assumption that quantity parameters are immutable or properly validated, which is violated by external control of these parameters.

Potential Impact

The primary impact of CVE-2025-8198 is financial fraud through price manipulation on eCommerce websites using the MinimogWP theme. Attackers can exploit this vulnerability to purchase products at incorrect prices by submitting fractional quantities, potentially paying less than the legitimate cost. This undermines the integrity of transaction data and can lead to revenue loss for affected organizations. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated attacks, increasing the risk of widespread abuse. Although confidentiality and availability are not directly impacted, the financial and reputational damage from fraudulent transactions can be significant. Organizations may also face customer trust issues and potential regulatory scrutiny if fraudulent transactions are not detected or mitigated. The vulnerability affects all sites using vulnerable versions of MinimogWP without the protective WooCommerce version, making it a critical concern for online retailers relying on this theme.

Mitigation Recommendations

To mitigate CVE-2025-8198, organizations should immediately verify the version of WooCommerce installed alongside the MinimogWP theme. Upgrading WooCommerce to version 9.8.2 or later is the most effective mitigation, as this version includes protections against fractional quantity manipulation. If upgrading WooCommerce is not immediately feasible, organizations should consider temporarily disabling the MinimogWP theme or restricting cart quantity inputs to integer values through custom validation or web application firewall (WAF) rules. Implementing strict input validation on quantity parameters at the application or server level can prevent fractional values from being processed. Additionally, monitoring transaction logs for anomalous fractional quantities or unusual purchase patterns can help detect exploitation attempts. Applying principle of least privilege to WordPress user roles and regularly updating all plugins and themes reduces the attack surface. Finally, organizations should stay alert for official patches or updates from ThemeMove addressing this vulnerability and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-25T16:26:50.958Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688573fcad5a09ad006b9cc1

Added to database: 7/27/2025, 12:34:04 AM

Last enriched: 2/26/2026, 4:54:49 PM

Last updated: 3/24/2026, 9:58:03 AM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses