Description
Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing woocommerce-role-pricing allows Cross Site Request Forgery.This issue affects Woocommerce Role Pricing: from n/a through <= 3.5.6.
Published: 2025-04-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a CSRF flaw in the WordPress Woocommerce Role Pricing plugin that allows a forged request to be sent to the plugin’s endpoints without proper verification. Because the plugin does not enforce origin or nonce checks, an attacker can submit state‑changing requests that lead to undesired changes in the plugin configuration. The flaw is identified as CWE‑352.

Affected Systems

All installations of the ablancodev Woocommerce Role Pricing plugin from its earliest release through and including version 3.5.6 are affected. Any WordPress site running the plugin in these versions is potentially vulnerable.

Risk and Exploitability

The CVSS base score of 4.3 places this vulnerability in the medium severity range, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves a malicious web page that forces a logged‑in user’s browser to send a request to the plugin’s admin‑ajax endpoint without a proper CSRF token. Once the user is authenticated, the exploit is straightforward.

Generated by OpenCVE AI on May 1, 2026 at 11:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Woocommerce Role Pricing plugin to a version that fixes the CSRF flaw, if such a version is available.
  • If an update cannot be performed immediately, consider disabling the plugin or restricting access to its administrative pages to trusted users only until the issue is addressed.
  • Implement CSRF protection by ensuring that state‑changing requests for the plugin include a valid nonce or by using a web application firewall to block cross‑origin POST requests without proper authentication.

Generated by OpenCVE AI on May 1, 2026 at 11:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9780 Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5. Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing woocommerce-role-pricing allows Cross Site Request Forgery.This issue affects Woocommerce Role Pricing: from n/a through <= 3.5.6.
Title WordPress Woocommerce Role Pricing Plugin <= 3.5.5 - Cross Site Request Forgery (CSRF) vulnerability WordPress Woocommerce Role Pricing Plugin <= 3.5.6 - Cross Site Request Forgery (CSRF) vulnerability
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Fri, 04 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5.
Title WordPress Woocommerce Role Pricing Plugin <= 3.5.5 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:20.464Z

Reserved: 2025-04-04T10:02:22.507Z

Link: CVE-2025-32271

cve-icon Vulnrichment

Updated: 2025-04-04T18:55:41.875Z

cve-icon NVD

Status : Deferred

Published: 2025-04-04T16:15:38.370

Modified: 2026-04-23T15:28:52.670

Link: CVE-2025-32271

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T11:15:15Z

Weaknesses