VYPR
Medium severity4.3NVD Advisory· Published Jun 10, 2025· Updated Apr 23, 2026

CVE-2025-49510

CVE-2025-49510

Description

Cross-Site Request Forgery (CSRF) vulnerability in WPFactory Min Max Step Quantity Limits Manager for WooCommerce product-quantity-for-woocommerce allows Cross Site Request Forgery.This issue affects Min Max Step Quantity Limits Manager for WooCommerce: from n/a through <= 5.1.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in the Min Max Step Quantity Limits Manager plugin for WooCommerce allows attackers to force authenticated users into unwanted actions.

Vulnerability

Overview

The Min Max Step Quantity Limits Manager for WooCommerce plugin (versions ≤ 5.1.0) contains a Cross-Site Request Forgery (CSRF) vulnerability [1]. This flaw enables an attacker to trick a logged-in administrator or other privileged user into unknowingly executing unwanted actions on the WordPress site [1]. The root cause is the lack of proper CSRF nonce validation on sensitive operations within the plugin.

Exploitation

Prerequisites

Exploitation requires the attacker to craft a malicious link or form and convince a privileged user—such as a site administrator—to click or interact with it while that user is authenticated to the WordPress admin dashboard [1]. No direct network access or additional authentication is required beyond the victim's legitimate session [1]. The attack can be performed remotely, as the malicious payload can be delivered via email, social engineering, or injected into a site the victim visits.

Impact

Successful exploitation allows the attacker to perform unauthorized actions under the victim's credentials, such as modifying plugin settings, changing quantity limits, or potentially performing other administrative tasks [1]. This can lead to manipulation of e-commerce product constraints, which may affect pricing, stock control, or customer experience. The CVSS score (4.3, Medium) reflects the low complexity and user interaction requirements, with the impact limited to the plugin's scope [1].

Mitigation

The vendor released version 5.1.1, which patches the vulnerability by implementing proper CSRF protection [1]. Users are strongly advised to update to this version immediately. For sites that cannot update promptly, administrators should exercise caution when clicking links or submitting forms from untrusted sources [1]. The vulnerability is noted to be of low severity, but it is part of mass-exploit campaigns targeting WordPress plugins, so timely remediation is recommended [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.