CVE-2025-12115

7.5 HIGH

📋 TL;DR

The WPC Name Your Price for WooCommerce WordPress plugin allows unauthenticated attackers to purchase products at arbitrary prices even when custom pricing is disabled for specific products. This affects all WordPress sites using this plugin up to version 2.1.9. Attackers can exploit this to buy products at significantly reduced prices, causing financial loss to e-commerce stores.

💻 Affected Systems

Products:
  • WPC Name Your Price for WooCommerce WordPress plugin
Versions: All versions up to and including 2.1.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WooCommerce stores using this specific plugin with products that have custom pricing disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers purchase high-value inventory at near-zero prices, causing substantial financial loss and inventory depletion.

🟠

Likely Case

Opportunistic attackers purchase discounted products at below-market prices, resulting in moderate financial loss.

🟢

If Mitigated

Regular price monitoring detects anomalies, limiting financial impact to isolated incidents.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill - attackers simply need to modify price parameters in purchase requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3386310%40wpc-name-your-price&new=3386310%40wpc-name-your-price&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WPC Name Your Price for WooCommerce'. 4. Click 'Update Now' if available, or download version 2.2.0+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable plugin temporarily

all

Deactivate the vulnerable plugin until patched

wp plugin deactivate wpc-name-your-price

Enable price validation

all

Add custom WooCommerce validation to reject modified prices

Add custom PHP code to validate price parameters in checkout process

🧯 If You Can't Patch

  • Disable the WPC Name Your Price plugin entirely and use alternative pricing solutions
  • Implement server-side price validation and monitoring for price anomalies in real-time

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version - if WPC Name Your Price is version 2.1.9 or lower, you are vulnerable.

Check Version:

wp plugin get wpc-name-your-price --field=version

Verify Fix Applied:

Verify plugin version is 2.2.0 or higher in WordPress admin panel, then test purchasing a product with custom pricing disabled to ensure price cannot be modified.

📡 Detection & Monitoring

Log Indicators:

  • Unusually low order values compared to product prices
  • Multiple purchases from same IP with modified price parameters
  • Checkout requests with price parameters in URL or POST data

Network Indicators:

  • HTTP POST requests to checkout containing modified price fields
  • Unusual price parameters in WooCommerce API calls

SIEM Query:

source="woocommerce" AND (price<regular_price OR price_override=true) AND product="*"

🔗 References

📤 Share & Export