Description
The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Printful
Printful printful Integration For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Printful
Printful printful Integration For Woocommerce Wordpress Wordpress wordpress |
Thu, 19 Feb 2026 04:15:00 +0000
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-19T17:42:42.024Z
Reserved: 2025-10-27T22:10:07.660Z
Link: CVE-2025-12375
Updated: 2026-02-19T17:04:31.953Z
Status : Awaiting Analysis
Published: 2026-02-19T07:17:27.850
Modified: 2026-02-19T15:53:02.850
Link: CVE-2025-12375
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:07:40Z
Weaknesses