Description
Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia woo-recargo-de-equivalencia allows Cross Site Request Forgery.This issue affects WooCommerce Recargo de Equivalencia: from n/a through <= 1.6.24.
Published: 2025-02-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a classic CSRF flaw that permits an attacker to forge privileged operations on a site that uses the WooCommerce Recargo de Equivalencia plugin. A successfully crafted request could trigger state‑changing actions without the user’s consent, potentially leading to unauthorized changes in shop settings or order handling. The weakness is classified as CWE‑352 and the CVSS score of 4.3 indicates a moderate severity that could compromise data integrity if exploited.

Affected Systems

All installations of the josesan WooCommerce Recargo de Equivalencia plugin with versions up to and including 1.6.24 are vulnerable. The vulnerability manifests in WordPress sites where the plugin is active, regardless of underlying WordPress version. No other plugins are listed as affected.

Risk and Exploitability

Because the CVSS score is 4.3, the risk is moderate, though the EPSS score of <1% suggests exploitation is unlikely. The issue is not in the CISA KEV catalog, and no public exploit is known. The attack vector is likely an unauthenticated web request that leverages a user who is logged into the administrative area; an attacker might craft a link or packet that the logged user will unknowingly submit, resulting in a CSRF. The plugin upgrade effectively mitigates the flaw.

Generated by OpenCVE AI on May 1, 2026 at 15:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to version 1.6.25 or later, which contains the CSRF fix.
  • If an update is not immediately feasible, temporarily deactivate the WooCommerce Recargo de Equivalencia plugin until the patch is applied.
  • Verify that any custom user roles or scripts added by the plugin are removed or migrated to non‑vulnerable alternatives after upgrading.

Generated by OpenCVE AI on May 1, 2026 at 15:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4321 Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24. Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia woo-recargo-de-equivalencia allows Cross Site Request Forgery.This issue affects WooCommerce Recargo de Equivalencia: from n/a through <= 1.6.24.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Mon, 24 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24.
Title WordPress WooCommerce Recargo de Equivalencia Plugin <= 1.6.24 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:48.672Z

Reserved: 2025-02-21T16:45:54.608Z

Link: CVE-2025-27342

cve-icon Vulnrichment

Updated: 2025-02-24T15:44:31.398Z

cve-icon NVD

Status : Deferred

Published: 2025-02-24T15:15:19.833

Modified: 2026-04-23T15:26:24.507

Link: CVE-2025-27342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T15:45:16Z

Weaknesses