{"id":52416,"date":"2025-06-16T07:11:11","date_gmt":"2025-06-16T07:11:11","guid":{"rendered":""},"modified":"2025-07-07T17:56:45","modified_gmt":"2025-07-07T23:56:45","slug":"cve-2025-48123-critical-code-injection-vulnerability-in-holest-engineering-spreadsheet-price-changer-for-woocommerce-and-wp-e-commerce-light","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-48123-critical-code-injection-vulnerability-in-holest-engineering-spreadsheet-price-changer-for-woocommerce-and-wp-e-commerce-light\/","title":{"rendered":"<strong>CVE-2025-48123: Critical Code Injection Vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce \u2013 Light<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This blog post is dedicated to dissecting and understanding a critical vulnerability, referred to as CVE-2025-48123. This vulnerability resides in the Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce &#8211; Light, potentially affecting a large number of e-commerce sites that utilize these plugins. The issue at hand, code injection, is a notorious type of vulnerability that can allow attackers to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5527-critical-vulnerability-exposing-potential-system-compromise-in-tenda-rx3\/\"  data-wpil-monitor-id=\"58690\">inject and execute arbitrary code<\/a> in the target system, leading to potentially devastating consequences, such as system compromise or data leakage.<br \/>\nThe <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-23107-severe-out-of-bounds-write-vulnerability-in-samsung-mobile-processor-exynos-1480-and-2400\/\"  data-wpil-monitor-id=\"58755\">severity of this vulnerability<\/a> is underscored by its CVSS score of 10.0, the highest possible rating, reflecting the extreme risk associated with this vulnerability. As such, understanding this exploit and how to mitigate it is of utmost importance to anyone using the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41646-critical-authentication-bypass-vulnerability-in-affected-software-packages\/\"  data-wpil-monitor-id=\"59279\">affected software<\/a>.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-48123<br \/>\nSeverity: Critical, CVSS score 10.0<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-21462-memory-corruption-vulnerability-leading-to-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"59098\">System compromise<\/a>, data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1219109602\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48129-privilege-escalation-vulnerability-in-spreadsheet-price-changer-for-woocommerce-and-wp-e-commerce-light\/\"  data-wpil-monitor-id=\"60255\">Spreadsheet Price Changer for WooCommerce<\/a> | n\/a through 2.4.37<br \/>\nWP E-commerce &#8211; Light | n\/a through 2.4.37<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-49845-memory-corruption-vulnerability-in-frs-uds-generation-process\/\"  data-wpil-monitor-id=\"58987\">vulnerability arises from improper control of the generation<\/a> of code within the application. In essence, the application fails to adequately validate and sanitize user-supplied input, allowing an attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49013-code-injection-vulnerability-in-wilderforge-projects-due-to-unsafe-github-actions-usage\/\"  data-wpil-monitor-id=\"60080\">inject malicious code<\/a>. When this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36038-remote-code-execution-vulnerability-in-ibm-websphere-application-server\/\"  data-wpil-monitor-id=\"64677\">code is processed by the application<\/a>, it is executed with the same permissions as the application itself, effectively granting the attacker control over the system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2220101626\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how this vulnerability might be exploited:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/changePrice HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{\n&quot;product_id&quot;: &quot;12345&quot;,\n&quot;new_price&quot;: &quot;; DROP TABLE users; --&quot;\n}<\/code><\/pre>\n<p>In this example, the attacker is attempting to exploit the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4578-sql-injection-vulnerability-in-file-provider-wordpress-plugin\/\"  data-wpil-monitor-id=\"58805\">vulnerability by injecting a SQL<\/a> command (`DROP TABLE users;`) into the `new_price` parameter. If successful, this would cause the application to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3055-critical-arbitrary-file-deletion-vulnerability-in-wp-user-frontend-pro-plugin\/\"  data-wpil-monitor-id=\"59158\">delete the entire &#8220;users&#8221;<\/a> table from the database.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>Given the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30220-high-severity-xml-external-entity-xxe-vulnerability-in-geoserver-geotools-and-geonetwork\/\"  data-wpil-monitor-id=\"60608\">severity of this vulnerability<\/a>, it is highly recommended that users of the affected software apply the patch provided by the vendor as soon as possible. As an interim measure, implementing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can help to filter out <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24274-input-validation-issue-exploitable-via-malicious-app-on-macos\/\"  data-wpil-monitor-id=\"59590\">malicious inputs and protect against exploitation<\/a> attempts. However, these should not be relied upon as long-term solutions, as they may not be able to prevent all potential attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This blog post is dedicated to dissecting and understanding a critical vulnerability, referred to as CVE-2025-48123. This vulnerability resides in the Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce &#8211; Light, potentially affecting a large number of e-commerce sites that utilize these plugins. The issue at hand, code injection, is a notorious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[78],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-52416","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/52416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=52416"}],"version-history":[{"count":12,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/52416\/revisions"}],"predecessor-version":[{"id":58154,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/52416\/revisions\/58154"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=52416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=52416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=52416"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=52416"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=52416"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=52416"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=52416"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=52416"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=52416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}