VYPR
Medium severity4.3NVD Advisory· Published Apr 15, 2026· Updated Apr 23, 2026

CVE-2025-15635

CVE-2025-15635

Description

Cross-Site Request Forgery (CSRF) vulnerability in ZAYTECH Smart Online Order for Clover clover-online-orders allows Cross Site Request Forgery.This issue affects Smart Online Order for Clover: from n/a through <= 1.6.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in ZAYTECH Smart Online Order for Clover plugin (≤1.6.0) allows attackers to force authenticated users to execute unwanted actions.

Vulnerability

Overview

The Smart Online Order for Clover plugin for WordPress, developed by ZAYTECH, contains a Cross-Site Request Forgery (CSRF) vulnerability in versions up to and through version 1.6.0. This flaw arises from insufficient validation of request origins, allowing an attacker to craft malicious requests that are executed under the identity of an authenticated user [1].

Exploitation

Method

Exploitation requires user interaction: a higher-privileged user (such as an administrator) must be tricked into clicking a malicious link, visiting a crafted page, or submitting a form while authenticated to the WordPress admin area. The attacker does not need direct access to the site but can leverage social engineering to deliver the payload [1].

Impact

Successful CSRF attacks can force the victim to perform unintended actions under their current authentication, such as changing plugin settings, creating new admin accounts, or modifying orders. This could lead to partial loss of integrity and availability, though the CVSS score of 4.3 (Medium) reflects the requirement for user interaction and the limited scope of direct impact [1].

Mitigation

Users are strongly advised to update the plugin to a patched version immediately. If an update is not available, temporary workarounds include implementing additional security measures such as implementing CSRF tokens or using a web application firewall may help, but updating is the recommended course of action [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1