CVE-2025-3743
📋 TL;DR
The Upsell Funnel Builder for WooCommerce WordPress plugin allows unauthenticated attackers to manipulate order bump products and discounts before processing. This vulnerability affects all versions up to 3.0.0, potentially impacting any WordPress site using this plugin for WooCommerce upselling.
💻 Affected Systems
- Upsell Funnel Builder for WooCommerce WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could add arbitrary products to orders with manipulated discounts, leading to financial loss, inventory discrepancies, and potential data exposure if product IDs are used to access restricted items.
Likely Case
Attackers exploit the vulnerability to apply unauthorized discounts or add different products to orders, resulting in revenue loss and order fulfillment issues.
If Mitigated
With proper input validation and access controls, the impact is limited to attempted attacks that fail due to server-side validation.
🎯 Exploit Status
The vulnerability is in a public function with clear manipulation points; exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.0.0
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3279944/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Upsell Funnel Builder for WooCommerce'. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete plugin, then install latest version from WordPress repository.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin to prevent exploitation while awaiting patch.
wp plugin deactivate upsell-order-bump-offer-for-woocommerce
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests manipulating 'add_offer_in_cart' parameters.
- Monitor and audit order logs for unusual discount patterns or product ID changes.
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins; if version is 3.0.0 or lower, it's vulnerable.
Check Version:
wp plugin get upsell-order-bump-offer-for-woocommerce --field=version
Verify Fix Applied:
After update, verify plugin version is above 3.0.0; test order bump functionality to ensure it processes correctly without parameter manipulation.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to 'add_offer_in_cart' endpoint with modified product_id or discount parameters
- Order logs showing unexpected product additions or discount applications
Network Indicators:
- HTTP requests containing manipulated 'product_id' or 'discount' fields in cart-related endpoints
SIEM Query:
source="wordpress.log" AND "add_offer_in_cart" AND ("product_id" OR "discount")
🔗 References
- https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1771
- https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1773
- https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1818
- https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1829
- https://plugins.trac.wordpress.org/changeset/3279944/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b0e1546b-c8cc-4d57-9909-153209e3a9c6?source=cve