CVE-2025-13606
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-02
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | wp_ultimate_exporter | 2.20 |
| wordpress | wp_ultimate_exporter | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the Export All Posts, Products, Orders, Refunds & Users plugin for WordPress, affecting all versions up to and including 2.19. It occurs because the plugin's parseData function lacks proper nonce validation, allowing an attacker to trick a site administrator into performing an action via a forged request. This can lead to unauthorized export of sensitive information such as user data, email addresses, password hashes, and WooCommerce data to a location controlled by the attacker.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of sensitive information including user data, email addresses, password hashes, and WooCommerce data. An attacker can exploit this by tricking a site administrator into executing a forged request, resulting in sensitive data being exported to an attacker-controlled file path on the server. This compromises the confidentiality of the data and could lead to further attacks or data breaches.