Description
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Published: 2025-03-26
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin contains a PHP Object Injection vulnerability that is triggered by deserializing untrusted input from the 'form_data' parameter. An attacker who is authenticated with Administrator or higher privileges can submit crafted input to inject a PHP object. The vulnerability is classified as CWE-502, a generic lack of proper sanitization of serialized data. Because the plugin itself does not include a known proof‑of‑concept (POP) chain, the injection alone does not directly allow code execution or data exfiltration. However, if another plugin or theme with a vulnerable POP chain is installed on the same WordPress site, the injected object could be leveraged to delete arbitrary files, retrieve sensitive data, or execute code, depending on the specifics of that chain.

Affected Systems

The affected software is the WebToffee Product Import Export for WooCommerce plugin, all versions up to and including 2.5.0. Users running any of these versions on a WordPress installation are vulnerable.

Risk and Exploitability

The CVSS score of 7.2 indicates a moderate to high severity. The EPSS score of <1% indicates a lower, but still realistic, probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Because exploitation requires authenticated access with at least Administrator privileges, the attack vector is internal but limited to users who can log into the WordPress admin interface. The lack of an existing POP chain in the plugin reduces immediate risk, yet the potential for a cascading attack when combined with other vulnerable extensions remains a significant concern.

Generated by OpenCVE AI on May 4, 2026 at 14:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Product Import Export for WooCommerce plugin to the latest version that removes the PHP object injection flaw if an update is available.
  • If an immediate upgrade is not possible, deactivate the plugin or disable its import/export feature to block the form_data endpoint from receiving untrusted input.
  • Deploy a Web Application Firewall rule or adjust access controls to restrict the form_data parameter so that it can only be processed by non‑admin users or not at all.
  • Review and update any other installed plugins or themes that may contain known POP chains, removing or patching them to eliminate potential downstream exploitation pathways.

Generated by OpenCVE AI on May 4, 2026 at 14:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8124 The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
History

Fri, 05 Dec 2025 17:00:00 +0000

Type Values Removed Values Added
References

Wed, 09 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Webtoffee
Webtoffee product Import Export For Woocommerce
CPEs cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*
Vendors & Products Webtoffee
Webtoffee product Import Export For Woocommerce

Wed, 26 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 26 Mar 2025 12:15:00 +0000

Type Values Removed Values Added
Description The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Title Product Import Export for WooCommerce <= 2.5.0 - Authenticated (Admin+) PHP Object Injection via form_data Parameter
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Webtoffee Product Import Export For Woocommerce
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:45.674Z

Reserved: 2025-03-03T23:08:06.268Z

Link: CVE-2025-1913

cve-icon Vulnrichment

Updated: 2025-03-26T13:13:30.467Z

cve-icon NVD

Status : Modified

Published: 2025-03-26T12:15:15.513

Modified: 2025-12-05T17:16:03.297

Link: CVE-2025-1913

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T15:00:03Z

Weaknesses