CVE-2025-60171

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the Conditional Cart Messages for WooCommerce plugin allows attackers to trick authenticated administrators into performing unintended actions, which can lead to stored cross-site scripting (XSS). The vulnerability affects all WordPress sites using this plugin from any version up to 1.2.10. Attackers can inject malicious scripts that execute when other users visit affected pages.

💻 Affected Systems

Products:
  • Conditional Cart Messages for WooCommerce – YourPlugins.com
Versions: n/a through 1.2.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. The plugin must be active and accessible to authenticated users with appropriate privileges.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Attackers trick administrators into saving malicious JavaScript in cart messages, which then executes for all users viewing their cart, potentially stealing session data or performing unauthorized actions.

🟢

If Mitigated

With proper CSRF protections and content sanitization, the attack would fail, preventing any malicious script injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user (typically an administrator) into clicking a malicious link or visiting a crafted page while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.11 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/yourplugins-wc-conditional-cart-notices/vulnerability/wordpress-conditional-cart-messages-for-woocommerce-yourplugins-com-plugin-1-2-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Conditional Cart Messages for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.2.11+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

linux

Disable the vulnerable plugin until patched

wp plugin deactivate yourplugins-wc-conditional-cart-notices

CSRF Protection Headers

all

Add CSRF protection headers to WordPress

Add to .htaccess: Header set X-Frame-Options DENY
Add to wp-config.php: define('FORCE_SSL_ADMIN', true);

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative cart message solutions
  • Restrict admin access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.2.10 or earlier, you are vulnerable.

Check Version:

wp plugin get yourplugins-wc-conditional-cart-notices --field=version

Verify Fix Applied:

Verify plugin version is 1.2.11 or later. Test CSRF protection by attempting to submit form changes without proper nonce tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php or plugin-specific endpoints without referrer headers
  • Multiple failed CSRF token validations

Network Indicators:

  • Unexpected iframe loads in admin pages
  • Cross-origin requests to plugin endpoints

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "conditional-cart") AND http_method="POST" AND NOT referrer CONTAINS own_domain

🔗 References

📤 Share & Export