CVE-2025-62890

8.8 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Brands for WooCommerce allows attackers to trick authenticated administrators into performing unintended actions. This affects WordPress sites using the Premmerce Brands plugin for WooCommerce. Attackers can exploit this to modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • Premmerce Brands for WooCommerce
Versions: All versions up to and including 1.2.13
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the Premmerce Brands plugin installed. The vulnerability affects the administrative interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify WooCommerce brand settings, potentially affecting product categorization, SEO settings, or other administrative configurations that could impact business operations.

🟠

Likely Case

Attackers trick administrators into changing plugin settings, potentially disrupting brand displays or SEO configurations on the WooCommerce store.

🟢

If Mitigated

With proper CSRF protections and admin awareness, the risk is limited to unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into visiting a malicious page while logged into WordPress admin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.14 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/premmerce-woocommerce-brands/vulnerability/wordpress-premmerce-brands-for-woocommerce-plugin-1-2-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Premmerce Brands for WooCommerce'. 4. Click 'Update Now' if available, or download version 1.2.14+ from WordPress.org. 5. Activate the updated plugin.

🔧 Temporary Workarounds

CSRF Protection Headers

all

Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risk

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'"
Set SameSite=Strict in PHP session cookie configuration

Admin Session Management

all

Implement strict admin session timeouts and require re-authentication for sensitive actions

Add to wp-config.php: define('WP_AUTH_COOKIE_TIMEOUT', 3600); // 1 hour timeout

🧯 If You Can't Patch

  • Disable the Premmerce Brands plugin until patched
  • Implement web application firewall (WAF) rules to detect and block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Premmerce Brands for WooCommerce → Version. If version is 1.2.13 or lower, you are vulnerable.

Check Version:

wp plugin list --name="Premmerce Brands for WooCommerce" --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify the plugin version shows 1.2.14 or higher in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with admin referrers from unexpected sources
  • Unexpected changes to premmerce_brands settings in database

Network Indicators:

  • POST requests to admin endpoints without proper CSRF tokens
  • Requests with mismatched Origin/Referer headers

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" OR "premmerce") AND status=200 AND method=POST AND NOT referer="*wp-admin*"

🔗 References

📤 Share & Export