VYPR
Medium severity5.4NVD Advisory· Published May 19, 2025· Updated Apr 28, 2026

CVE-2025-48342

CVE-2025-48342

Description

Cross-Site Request Forgery (CSRF) vulnerability in RedefiningTheWeb Dynamic Pricing & Discounts Lite for WooCommerce woo-dynamic-pricing-discounts-lite allows Cross Site Request Forgery.This issue affects Dynamic Pricing & Discounts Lite for WooCommerce: from n/a through <= 2.0.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Dynamic Pricing & Discounts Lite for WooCommerce up to v2.0.4 allows attackers to force privileged users to perform unwanted actions.

Vulnerability

Overview

The Dynamic Pricing & Discounts Lite for WooCommerce plugin (woo-dynamic-pricing-discounts-lite) versions up to and including 2.0.4 are vulnerable to Cross-Site Request Forgery (CSRF). This issue originates from insufficient validation of request origins, allowing an attacker to trick authenticated users into executing unintended actions.

Exploitation

Conditions

Exploitation requires user interaction: a privileged user must click a malicious link, visit a crafted page, or submit a malicious form. The attacker does not need authentication but relies on the victim's active session. The CSRF can be initiated by any role, but successful exploitation depends on the victim having higher privileges (e.g., admin or shop manager).

Impact

A successful CSRF attack can force the victim to carry out unauthorized actions under their current authentication level. This may include modifying plugin settings, altering pricing rules, or performing other administrative operations, potentially leading to data integrity compromise or further attacks.

Mitigation

The vendor has not released a patch as of the publication date. Immediate action recommended: update the plugin if a patched version becomes available. As a workaround, implement additional CSRF protections such as nonce validation or employ a Web Application Firewall (WAF). The vulnerability is rated Medium (CVSS 5.4) and is known to be used in mass-exploit campaigns [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.