Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

Posted on May 28, 2025May 28, 2025 By CWS

A essential safety vulnerability within the common TI WooCommerce Wishlist plugin has left over 100,000 WordPress web sites uncovered to potential cyberattacks, with safety researchers warning of imminent exploitation dangers.

The vulnerability, designated as CVE-2025-47577 and assigned the utmost CVSS rating of 10.0, permits unauthenticated attackers to add arbitrary recordsdata to affected web sites, doubtlessly main to finish server compromise.

The TI WooCommerce Wishlist plugin, which provides wishlist performance to WooCommerce shops, has change into a big safety legal responsibility for e-commerce web sites worldwide.

The vulnerability particularly impacts model 2.9.2 and all earlier variations, with no patched launch at the moment accessible from the plugin builders.

This safety flaw represents one of the vital extreme WordPress plugin vulnerabilities found in latest months, given its widespread deployment and the severity of potential assaults.

Patchstack analysts recognized this essential vulnerability throughout routine safety assessments and instantly tried to contact the plugin vendor on March 26, 2025.

Nonetheless, after receiving no response from the builders for practically two months, the safety agency proceeded to publish the vulnerability particulars to their database on Could 16, 2025, adopted by a public advisory on Could 27, 2025.

The shortage of vendor response has left web site directors with restricted choices past fully eradicating the plugin from their installations.

Technical An infection Mechanism

The vulnerability stems from a elementary flaw within the plugin’s file add dealing with mechanism, particularly inside the tinvwl_upload_file_wc_fields_factory perform.

This perform processes file uploads by way of WordPress’s native wp_handle_upload perform however intentionally disables essential safety validations that will usually forestall malicious file uploads.

The problematic code demonstrates a harmful configuration that bypasses WordPress’s built-in safety measures:-

perform tinvwl_upload_file_wc_fields_factory( $file ) {
if (!function_exists( ‘wp_handle_upload’ ) ) {
require_once( ABSPATH . ‘wp-admin/contains/file.php’ );
}
$add = wp_handle_upload(
$file,
[
‘test_form’ => false,
‘test_type’ => false,
]
);
return $add;
}

The essential safety failure happens by way of the ‘test_type’ => false parameter, which explicitly disables file sort validation that will usually limit uploads to protected file varieties.

This configuration permits attackers to add executable PHP recordsdata on to the server, which may then be accessed and executed remotely to realize full system compromise.

The vulnerability is simply exploitable when the WC Fields Manufacturing facility plugin is concurrently lively, creating a particular assault vector that impacts a subset of the plugin’s consumer base.

Strive in-depth sandbox malware evaluation for your SOC group. Get ANY.RUN particular provide solely till Could 31 -> Strive Right here

Cyber Security News Tags:Cyberattack, Exposes, Plugin, Vulnerability, Websites, Wishlist, WooCommerce, WordPress

Post navigation

Previous Post: Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
Next Post: 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Related Posts

How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News