Impact
The vulnerability is a missing nonce validation in a WordPress plugin that enables Cross‑Site Request Forgery. An unauthenticated attacker can submit a forged request that causes the site’s administrator or shop manager to update product information, including prices, descriptions, and other fields. This compromise of data integrity can lead to financial loss and damage to product listings.
Affected Systems
This flaw affects the realmag777 "BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net" plugin for WordPress. All releases up to and including version 1.1.5 are impacted. The plug‑in is typically deployed on WooCommerce‑enabled sites running WordPress.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. Exploitation relies on a typical CSRF vector: the attacker must lure an authorized user to click a malicious link or submit a forged form. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the availability of an unauthenticated attack path and the ability to alter product data make this risk meaningful for e‑commerce operators.
OpenCVE Enrichment