CVE-2025-48129
BaseFortify
Publication date: 2025-06-09
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48129 is a high-severity privilege escalation vulnerability in the WordPress plugin "Spreadsheet Price Changer for WooCommerce and WP E-commerce β Light" (versions up to 2.4.37). It allows an unauthenticated attacker with low privileges to escalate their access rights to higher privileges, potentially gaining full control over the affected website. This means an attacker can bypass normal access controls and take over the site. [1]
How can this vulnerability impact me? :
This vulnerability can have a critical impact by allowing attackers to gain full control over your website. An attacker exploiting this flaw could escalate their privileges from low or no access to administrative levels, potentially leading to site takeover, data theft, unauthorized changes, or disruption of services. The risk is especially high because the vulnerability can be exploited remotely without authentication. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring for exploitation attempts targeting the WordPress plugin "Spreadsheet Price Changer for WooCommerce and WP E-commerce β Light" versions up to 2.4.37. Since the vulnerability allows privilege escalation by unauthenticated attackers, network intrusion detection systems (IDS) or web application firewalls (WAF) can be configured to look for suspicious requests attempting to exploit this plugin. Additionally, server-side malware scanning is recommended to identify any compromise, as plugin-based malware scanners may be unreliable. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying Patchstack's virtual patch (vPatch), which blocks exploitation attempts without requiring changes to the plugin code. Since no official patch or fixed version is currently available, using this virtual patch provides immediate protection. Users should also consider professional incident response and server-side malware scanning if a compromise is suspected. Prompt application of these mitigations is critical due to the high risk of automated mass exploitation. [1]