CVE-2025-49510
Description
Cross-Site Request Forgery (CSRF) vulnerability in WPFactory Min Max Step Quantity Limits Manager for WooCommerce product-quantity-for-woocommerce allows Cross Site Request Forgery.This issue affects Min Max Step Quantity Limits Manager for WooCommerce: from n/a through <= 5.1.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in the Min Max Step Quantity Limits Manager plugin for WooCommerce allows attackers to force authenticated users into unwanted actions.
Vulnerability
Overview
The Min Max Step Quantity Limits Manager for WooCommerce plugin (versions ≤ 5.1.0) contains a Cross-Site Request Forgery (CSRF) vulnerability [1]. This flaw enables an attacker to trick a logged-in administrator or other privileged user into unknowingly executing unwanted actions on the WordPress site [1]. The root cause is the lack of proper CSRF nonce validation on sensitive operations within the plugin.
Exploitation
Prerequisites
Exploitation requires the attacker to craft a malicious link or form and convince a privileged user—such as a site administrator—to click or interact with it while that user is authenticated to the WordPress admin dashboard [1]. No direct network access or additional authentication is required beyond the victim's legitimate session [1]. The attack can be performed remotely, as the malicious payload can be delivered via email, social engineering, or injected into a site the victim visits.
Impact
Successful exploitation allows the attacker to perform unauthorized actions under the victim's credentials, such as modifying plugin settings, changing quantity limits, or potentially performing other administrative tasks [1]. This can lead to manipulation of e-commerce product constraints, which may affect pricing, stock control, or customer experience. The CVSS score (4.3, Medium) reflects the low complexity and user interaction requirements, with the impact limited to the plugin's scope [1].
Mitigation
The vendor released version 5.1.1, which patches the vulnerability by implementing proper CSRF protection [1]. Users are strongly advised to update to this version immediately. For sites that cannot update promptly, administrators should exercise caution when clicking links or submitting forms from untrusted sources [1]. The vulnerability is noted to be of low severity, but it is part of mass-exploit campaigns targeting WordPress plugins, so timely remediation is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=5.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.