CVE-2025-32545

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the SOFTAGON WooCommerce Products without featured images WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. When exploited, this CSRF vulnerability can lead to Reflected Cross-Site Scripting (XSS), enabling attackers to execute malicious scripts in the victim's browser context. This affects WordPress sites using the vulnerable plugin version.

💻 Affected Systems

Products:
  • SOFTAGON WooCommerce Products without featured images WordPress plugin
Versions: 0.1 and earlier
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Attack requires administrator to be tricked into visiting malicious page while authenticated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could trick administrators into executing malicious JavaScript that steals session cookies, performs administrative actions, or installs backdoors, potentially leading to complete site compromise.

🟠

Likely Case

Attackers create phishing pages that trick logged-in administrators into visiting malicious links, resulting in unauthorized plugin configuration changes or data theft.

🟢

If Mitigated

With proper CSRF tokens and input validation, the attack would fail as requests would be rejected without valid tokens.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF to XSS chain requires social engineering but is technically simple to implement. No public exploit code found, but the vulnerability pattern is well-known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woocommerce-products-without-featured-images/vulnerability/wordpress-woocommerce-products-without-featured-images-plugin-0-1-csrf-to-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WooCommerce Products without featured images'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate woocommerce-products-without-featured-images

Implement CSRF protection middleware

all

Add custom CSRF token validation for all plugin admin actions

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative methods to handle products without featured images
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'WooCommerce Products without featured images' version 0.1 or earlier

Check Version:

wp plugin get woocommerce-products-without-featured-images --field=version

Verify Fix Applied:

Verify plugin version is 0.2 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin endpoints without referrer headers
  • Multiple failed CSRF token validations

Network Indicators:

  • External domains making requests to /wp-admin/admin-ajax.php with plugin-specific actions

SIEM Query:

source="wordpress.log" AND ("woocommerce-products-without-featured-images" OR "admin-ajax.php") AND status=200 AND referrer="-"

🔗 References

📤 Share & Export