CVE-2025-12588
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-12
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| woocommerce | woocommerce | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) in the USB Qr Code Scanner For Woocommerce plugin for WordPress, affecting all versions up to and including 1.0.0. It occurs because the plugin's settings page lacks nonce validation, allowing unauthenticated attackers to update the plugin's settings by tricking an administrator into performing an action like clicking a malicious link.
How can this vulnerability impact me? :
The vulnerability allows an attacker to change the plugin's settings without authentication by exploiting an administrator's actions. This can lead to unauthorized configuration changes, potentially disrupting the plugin's functionality or security posture, although it does not directly compromise confidentiality or availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the USB Qr Code Scanner For Woocommerce plugin to a version later than 1.0.0 where the nonce validation issue is fixed. Until an update is available, restrict access to the plugin's settings page to trusted administrators only and avoid clicking on suspicious links that could trigger forged requests.