CVE-2025-62080
Description
Cross-Site Request Forgery (CSRF) vulnerability in Channelize.io Team Live Shopping & Shoppable Videos For WooCommerce live-shopping-video-streams allows Cross Site Request Forgery.This issue affects Live Shopping & Shoppable Videos For WooCommerce: from n/a through <= 2.2.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in Channelize.io's Live Shopping plugin for WooCommerce (≤2.2.0) allows attackers to force privileged users to execute unwanted actions.
Vulnerability
Overview
The Cross-Site Request Forgery (CSRF) vulnerability in Channelize.io's Live Shopping & Shoppable Videos For WooCommerce plugin (versions up to and including 2.2.0) allows an unauthenticated attacker to trick a logged-in administrator into performing unintended actions. This occurs because the plugin does not validate or verify the origin of requests when processing sensitive operations [1].
Exploitation
Details
To exploit this vulnerability, an attacker must craft a malicious link or form that, when clicked or submitted by an authenticated administrator, triggers a state-changing request to the WordPress site. The attack requires user interaction—the victim must be logged in and perform an action such as clicking a link or visiting a crafted page. No special privileges are needed for the attacker beyond the ability to deliverability of the malicious payload [1].
Impact
Successful exploitation could allow an attacker to force the victim to execute unwanted actions under their current authentication, such as modifying plugin settings, creating new admin users, or performing other administrative tasks. This can lead to partial loss of integrity and availability, though the CVSS score of 4.3 (Medium) reflects the requirement for user interaction [1].
Mitigation
The vendor has not released a patched version as of the publication date. Users are advised to update the plugin immediately if a fix becomes available. As a workaround, administrators should avoid clicking suspicious links while logged in, and consider using security plugins that add CSRF tokens or same-origin checks. This vulnerability is noted as being used in mass-exploit campaigns, so prompt action is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.2.0
- Range: <=2.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.