CVE-2025-48144

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Import Export For WooCommerce WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WooCommerce sites using vulnerable versions of the plugin. Attackers can inject malicious scripts that execute when administrators view affected pages.

💻 Affected Systems

Products:
  • Import Export For WooCommerce WordPress Plugin
Versions: n/a through 1.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Attack requires administrator interaction.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript that steals administrator session cookies, leading to full site compromise, data theft, or malware distribution to site visitors.

🟠

Likely Case

Attackers trick administrators into clicking malicious links that inject XSS payloads, potentially compromising admin accounts and modifying site content.

🟢

If Mitigated

With proper CSRF protections and content security policies, the attack would fail or have limited impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF to XSS chain requires tricking authenticated administrators. No public exploit code found, but technique is well-known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.3 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/import-export-for-woocommerce/vulnerability/wordpress-import-export-for-woocommerce-plugin-1-6-2-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Import Export For WooCommerce'. 4. Click 'Update Now' if available. 5. If no update appears, download version 1.6.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate import-export-for-woocommerce

CSRF Protection Headers

all

Add anti-CSRF tokens via security plugin or custom code

🧯 If You Can't Patch

  • Restrict plugin access to trusted administrators only
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Import Export For WooCommerce version

Check Version:

wp plugin get import-export-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 1.6.3 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with import/export actions
  • Multiple failed CSRF token validations

Network Indicators:

  • Unexpected JavaScript injection in plugin settings pages
  • External script loads from suspicious domains

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action CONTAINS "import_export")

🔗 References

📤 Share & Export