CVE-2025-48129
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-09

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Incorrect Privilege Assignment vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light excel-like-price-change-for-woocommerce-and-wp-e-commerce-light allows Privilege Escalation.This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through <= 2.4.37.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-09
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-48129 is a high-severity privilege escalation vulnerability in the WordPress plugin "Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light" (versions up to 2.4.37). It allows an unauthenticated attacker with low privileges to escalate their access rights to higher privileges, potentially gaining full control over the affected website. This means an attacker can bypass normal access controls and take over the site. [1]


How can this vulnerability impact me? :

This vulnerability can have a critical impact by allowing attackers to gain full control over your website. An attacker exploiting this flaw could escalate their privileges from low or no access to administrative levels, potentially leading to site takeover, data theft, unauthorized changes, or disruption of services. The risk is especially high because the vulnerability can be exploited remotely without authentication. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for exploitation attempts targeting the WordPress plugin "Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light" versions up to 2.4.37. Since the vulnerability allows privilege escalation by unauthenticated attackers, network intrusion detection systems (IDS) or web application firewalls (WAF) can be configured to look for suspicious requests attempting to exploit this plugin. Additionally, server-side malware scanning is recommended to identify any compromise, as plugin-based malware scanners may be unreliable. Specific commands are not provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying Patchstack's virtual patch (vPatch), which blocks exploitation attempts without requiring changes to the plugin code. Since no official patch or fixed version is currently available, using this virtual patch provides immediate protection. Users should also consider professional incident response and server-side malware scanning if a compromise is suspected. Prompt application of these mitigations is critical due to the high risk of automated mass exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart