Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

Posted on May 28, 2025May 28, 2025 By CWS

A essential safety vulnerability within the common TI WooCommerce Wishlist plugin has left over 100,000 WordPress web sites uncovered to potential cyberattacks, with safety researchers warning of imminent exploitation dangers.

The vulnerability, designated as CVE-2025-47577 and assigned the utmost CVSS rating of 10.0, permits unauthenticated attackers to add arbitrary recordsdata to affected web sites, doubtlessly main to finish server compromise.

The TI WooCommerce Wishlist plugin, which provides wishlist performance to WooCommerce shops, has change into a big safety legal responsibility for e-commerce web sites worldwide.

The vulnerability particularly impacts model 2.9.2 and all earlier variations, with no patched launch at the moment accessible from the plugin builders.

This safety flaw represents one of the vital extreme WordPress plugin vulnerabilities found in latest months, given its widespread deployment and the severity of potential assaults.

Patchstack analysts recognized this essential vulnerability throughout routine safety assessments and instantly tried to contact the plugin vendor on March 26, 2025.

Nonetheless, after receiving no response from the builders for practically two months, the safety agency proceeded to publish the vulnerability particulars to their database on Could 16, 2025, adopted by a public advisory on Could 27, 2025.

The shortage of vendor response has left web site directors with restricted choices past fully eradicating the plugin from their installations.

Technical An infection Mechanism

The vulnerability stems from a elementary flaw within the plugin’s file add dealing with mechanism, particularly inside the tinvwl_upload_file_wc_fields_factory perform.

This perform processes file uploads by way of WordPress’s native wp_handle_upload perform however intentionally disables essential safety validations that will usually forestall malicious file uploads.

The problematic code demonstrates a harmful configuration that bypasses WordPress’s built-in safety measures:-

perform tinvwl_upload_file_wc_fields_factory( $file ) {
if (!function_exists( ‘wp_handle_upload’ ) ) {
require_once( ABSPATH . ‘wp-admin/contains/file.php’ );
}
$add = wp_handle_upload(
$file,
[
‘test_form’ => false,
‘test_type’ => false,
]
);
return $add;
}

The essential safety failure happens by way of the ‘test_type’ => false parameter, which explicitly disables file sort validation that will usually limit uploads to protected file varieties.

This configuration permits attackers to add executable PHP recordsdata on to the server, which may then be accessed and executed remotely to realize full system compromise.

The vulnerability is simply exploitable when the WC Fields Manufacturing facility plugin is concurrently lively, creating a particular assault vector that impacts a subset of the plugin’s consumer base.

Strive in-depth sandbox malware evaluation for your SOC group. Get ANY.RUN particular provide solely till Could 31 -> Strive Right here

Cyber Security News Tags:Cyberattack, Exposes, Plugin, Vulnerability, Websites, Wishlist, WooCommerce, WordPress

Post navigation

Previous Post: Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
Next Post: 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Related Posts

Top 10 Best Web Application Penetration Testing Companies in 2025 Cyber Security News
Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages Cyber Security News
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Happy DOM Vulnerability Exposes 2.7 Million Users To Remote Code Execution Attacks Cyber Security News
New Android Spyware Disguised as an Antivirus Attacking Business Executives Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News