The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_activate_product function. This makes it possible for unauthenticated attackers to bulk activate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34341 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_activate_product function. This makes it possible for unauthenticated attackers to bulk activate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_activate_product | |
| Weaknesses | CWE-352 |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:32:46.764Z
Reserved: 2023-05-25T16:16:52.256Z
Link: CVE-2023-2895
No data.
Status : Modified
Published: 2023-06-09T07:15:10.273
Modified: 2026-04-08T17:16:58.097
Link: CVE-2023-2895
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD