Description
The Simple Registration for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.8. This is due to missing nonce validation on the role requests admin page handler in the includes/display-role-admin.php file. This makes it possible for unauthenticated attackers to approve pending role requests and escalate user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-10-25
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Cross‑Site Request Forgery in WooCommerce plugin
Action: Apply Patch
AI Analysis

Impact

The Simple Registration for WooCommerce plugin contains a missing nonce check on the role‑request approval page, allowing an unauthenticated attacker to submit a forged request that grants administrative privileges to a pending user. This flaw directly equates to a privilege escalation vulnerability, categorized as CWE‑352. The attacker can exploit the issue by luring an administrator into visiting a crafted URL or link, which the admin’s browser would automatically include the necessary cookies, thereby approving the role request and elevating the user’s access level.

Affected Systems

All deployments of the Astoundify Simple Registration for WooCommerce plugin, versions 1.5.8 and earlier, are impacted. No version information indicating a fixed release was provided in the current CVE data, so the advisory should assume any installation at or below 1.5.8 is vulnerable until the plugin is updated.

Risk and Exploitability

With a CVSS score of 8.8 the flaw is considered high severity, yet the EPSS score of less than 1% suggests that, as of the last assessment, actual exploitation is unlikely. The vulnerability is not listed in CISA’s KEV catalog. Attack prerequisites include an unauthenticated attacker who can persuade or force an administrator to open a crafted page; no network‑level or privileged access is required beyond this social engineering step. The risk to confidentiality and integrity is significant, as compromised accounts could modify site content, posts, or administrative settings.

Generated by OpenCVE AI on April 22, 2026 at 12:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Simple Registration for WooCommerce to the latest version to eliminate the CSRF flaw
  • If an immediate update is not feasible, block or restrict access to the admin role‑request approval page to prevent forged requests from reaching the handler
  • Enhance administrator authentication, enforce two‑factor authentication, and monitor account role changes for suspicious activity

Generated by OpenCVE AI on April 22, 2026 at 12:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Simple Registration for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.8. This is due to missing nonce validation on the role requests admin page handler in the includes/display-role-admin.php file. This makes it possible for unauthenticated attackers to approve pending role requests and escalate user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Simple Registration for WooCommerce <= 1.5.8 - Cross-Site Request Forgery to Privilege Escalation via Role Request Approval
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:24.770Z

Reserved: 2025-10-22T19:29:09.264Z

Link: CVE-2025-12095

cve-icon Vulnrichment

Updated: 2025-10-27T15:55:24.687Z

cve-icon NVD

Status : Deferred

Published: 2025-10-25T06:15:36.097

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:15:16Z

Weaknesses