Plataforma
wordpress
Componente
shopengine
Corregido en
4.8.6
CVE-2025-12358 describes a Cross-Site Request Forgery (CSRF) vulnerability discovered in the ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress. This flaw allows unauthenticated attackers to manipulate user wishlists by tricking users into performing actions via forged requests. The vulnerability impacts versions 0.0.0 through 4.8.5, and a patch is available in version 4.8.6.
The primary impact of this CSRF vulnerability lies in the potential for unauthorized modification of user wishlists within a WordPress store. An attacker could craft malicious links or embed hidden forms that, when visited or submitted by a legitimate user, would silently add or remove products from their wishlist. This could be used for various malicious purposes, such as disrupting the user experience, manipulating purchase decisions, or even potentially gaining access to sensitive user data if the wishlist is linked to other user information. While the direct impact is limited to wishlist manipulation, the ease of exploitation and the potential for social engineering attacks make this a concerning vulnerability.
CVE-2025-12358 was publicly disclosed on December 3, 2025. No public proof-of-concept exploits are currently known. The vulnerability is not listed on the CISA KEV catalog as of this writing. Given the relatively simple nature of CSRF exploitation, it is possible that attackers may develop and deploy exploits in the future.
WordPress site owners utilizing the ShopEngine Elementor WooCommerce Builder Addon plugin, particularly those running older versions (0.0.0–4.8.5), are at risk. Shared hosting environments where plugin updates are managed centrally are also at increased risk, as they may be slower to apply security patches.
• wordpress / composer / npm:
grep -r "post_add_to_list" /var/www/html/wp-content/plugins/shopengine-elementor-woocommerce-builder-addon/• generic web:
curl -I https://your-wordpress-site.com/ | grep -i 'csrf-token'disclosure
Estado del Exploit
EPSS
0.02% (4% percentil)
CISA SSVC
Vector CVSS
The recommended mitigation for CVE-2025-12358 is to immediately upgrade the ShopEngine Elementor WooCommerce Builder Addon plugin to version 4.8.6 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) with CSRF protection rules to filter out malicious requests. Additionally, review and strengthen user awareness training to educate users about the risks of clicking on suspicious links or submitting forms from untrusted sources. There are no specific Sigma or YARA rules available for this vulnerability at this time.
Actualizar a la versión 4.8.6, o una versión parcheada más reciente
Análisis de vulnerabilidades y alertas críticas directamente en tu correo.
CVE-2025-12358 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the ShopEngine Elementor WooCommerce Builder Addon plugin for WordPress, allowing attackers to manipulate user wishlists.
Yes, if you are using ShopEngine Elementor WooCommerce Builder Addon versions 0.0.0 through 4.8.5, you are vulnerable to this CSRF attack.
Upgrade the plugin to version 4.8.6 or later to resolve the vulnerability. Consider WAF rules as a temporary workaround if upgrading is not immediately possible.
As of December 3, 2025, no active exploitation has been confirmed, but the ease of CSRF exploitation suggests potential future attacks.
Refer to the official ShopEngine website and WordPress plugin repository for the latest advisory and update information regarding CVE-2025-12358.
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.