Printful Integration for WooCommerce Vulnerability (Medium) – CVE-2…

Printful Integration for WooCommerce Vulnerability (Medium) – CVE-2…

by | Feb 18, 2026 | Plugins

Attack Vectors

CVE-2025-12375 is a Medium-severity Server-Side Request Forgery (SSRF) issue (CVSS 6.4) affecting the Printful Integration for WooCommerce plugin (slug: printful-shipping-for-woocommerce) in versions 2.2.11 and earlier.

The attack requires an authenticated WordPress account with at least Contributor privileges. An attacker could abuse the plugin’s advanced size chart REST API endpoint to make the website send outbound web requests to attacker-chosen destinations. Because those requests originate from your server, they can potentially reach internal services that are not directly exposed to the public internet.

Security Weakness

The vulnerability stems from insufficient validation of user-supplied URLs before they are passed to WordPress’s download_url() function. In practice, this means the plugin can be tricked into fetching content from arbitrary locations rather than only trusted, expected endpoints.

SSRF weaknesses are especially concerning for business websites because they can bypass perimeter controls: even if internal tools, admin panels, or cloud metadata services are not publicly reachable, they may still be reachable from the web server itself.

Remediation: Update Printful Integration for WooCommerce to version 2.2.12 or a newer patched version.

Technical or Business Impacts

For marketing leaders and executives, the practical risk is less about a single “bug” and more about what it could enable: unauthorized access to internal resources, leakage of sensitive configuration data, or changes to internal system behavior if internal services accept requests from the web server.

Potential business impacts can include data exposure (customer information, operational data, internal endpoints), compliance and audit findings (insufficient access control and patch governance), brand damage if the storefront is used as a foothold for broader compromise, and incident response cost due to investigation, containment, and recovery work.

Because the required privileges are only Contributor+, organizations with multiple content authors, agencies, or contractors should treat this as a meaningful risk: a single compromised user account could be enough to trigger the vulnerable behavior.

Similar Attacks

SSRF has been used in real-world incidents to pivot from an internet-facing application into internal systems and sensitive cloud resources. Examples include:

Capital One (2019) — SSRF used to access cloud-hosted data

Atlassian Jira (CVE-2019-8451) — SSRF vulnerability advisory

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers