Description
Cross-Site Request Forgery (CSRF) vulnerability in Dotstore Extra Fees Plugin for WooCommerce woo-conditional-product-fees-for-checkout allows Cross Site Request Forgery.This issue affects Extra Fees Plugin for WooCommerce: from n/a through <= 4.3.3.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized shop fee manipulation via CSRF
Action: Patch Now
AI Analysis

Impact

The Cross‑Site Request Forgery flaw in Dotstore Extra Fees Plugin for WooCommerce allows a remote attacker to force a logged‑in user to send arbitrary HTTP requests that change fee settings for product checkout. By exploiting the missing CSRF token or nonce validation, an attacker could add, modify or remove extra charges from the cart, which can lead to incorrect pricing, loss of revenue or a negative customer experience. This issue does not provide direct code execution but can undermine the integrity of the checkout flow.

Affected Systems

Any WordPress site running Dotstore Extra Fees Plugin for WooCommerce with a version up to and including 4.3.3 is affected. The vulnerability is present in all releases from the first available version up to 4.3.3, so any installation that has not been upgraded past that point is at risk.

Risk and Exploitability

No CVSS or EPSS scores are available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires a victim who is authenticated to the site and has permission to modify fee settings. Because the exploit hinges on user interaction with a malicious link or form, the likelihood of successful exploitation is moderate but could be higher in environments where administrators frequently log in from untrusted networks or devices. Until a patch is applied, the vulnerability poses a tangible risk to price integrity and revenue.

Generated by OpenCVE AI on April 8, 2026 at 09:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Extra Fees Plugin for WooCommerce to the latest release (4.3.4 or newer).
  • If the upgrade cannot be performed immediately, enforce strict role‑based access control so that only trusted administrators can change fee configurations and ensure that any endpoint that modifies fees requires a valid CSRF protection token.

Generated by OpenCVE AI on April 8, 2026 at 09:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Dotstore
Dotstore extra Fees Plugin For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Dotstore
Dotstore extra Fees Plugin For Woocommerce
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Dotstore Extra Fees Plugin for WooCommerce woo-conditional-product-fees-for-checkout allows Cross Site Request Forgery.This issue affects Extra Fees Plugin for WooCommerce: from n/a through <= 4.3.3.
Title WordPress Extra Fees Plugin for WooCommerce plugin <= 4.3.3 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Dotstore Extra Fees Plugin For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T08:30:39.107Z

Reserved: 2026-04-07T10:57:59.671Z

Link: CVE-2026-39671

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:38.553

Modified: 2026-04-08T21:26:35.910

Link: CVE-2026-39671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:41:04Z

Weaknesses