CVE-2025-12375

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers with Contributor-level access or higher to trick the website into making requests to any external server, potentially exposing sensitive internal information or modifying data. The issue arises from the plugin not properly checking the URLs provided by users before using them, which can lead to unauthorized access to internal services.

Technical Description

The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$914($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 19, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago