Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

Posted on May 28, 2025May 28, 2025 By CWS

A essential safety vulnerability within the common TI WooCommerce Wishlist plugin has left over 100,000 WordPress web sites uncovered to potential cyberattacks, with safety researchers warning of imminent exploitation dangers.

The vulnerability, designated as CVE-2025-47577 and assigned the utmost CVSS rating of 10.0, permits unauthenticated attackers to add arbitrary recordsdata to affected web sites, doubtlessly main to finish server compromise.

The TI WooCommerce Wishlist plugin, which provides wishlist performance to WooCommerce shops, has change into a big safety legal responsibility for e-commerce web sites worldwide.

The vulnerability particularly impacts model 2.9.2 and all earlier variations, with no patched launch at the moment accessible from the plugin builders.

This safety flaw represents one of the vital extreme WordPress plugin vulnerabilities found in latest months, given its widespread deployment and the severity of potential assaults.

Patchstack analysts recognized this essential vulnerability throughout routine safety assessments and instantly tried to contact the plugin vendor on March 26, 2025.

Nonetheless, after receiving no response from the builders for practically two months, the safety agency proceeded to publish the vulnerability particulars to their database on Could 16, 2025, adopted by a public advisory on Could 27, 2025.

The shortage of vendor response has left web site directors with restricted choices past fully eradicating the plugin from their installations.

Technical An infection Mechanism

The vulnerability stems from a elementary flaw within the plugin’s file add dealing with mechanism, particularly inside the tinvwl_upload_file_wc_fields_factory perform.

This perform processes file uploads by way of WordPress’s native wp_handle_upload perform however intentionally disables essential safety validations that will usually forestall malicious file uploads.

The problematic code demonstrates a harmful configuration that bypasses WordPress’s built-in safety measures:-

perform tinvwl_upload_file_wc_fields_factory( $file ) {
if (!function_exists( ‘wp_handle_upload’ ) ) {
require_once( ABSPATH . ‘wp-admin/contains/file.php’ );
}
$add = wp_handle_upload(
$file,
[
‘test_form’ => false,
‘test_type’ => false,
]
);
return $add;
}

The essential safety failure happens by way of the ‘test_type’ => false parameter, which explicitly disables file sort validation that will usually limit uploads to protected file varieties.

This configuration permits attackers to add executable PHP recordsdata on to the server, which may then be accessed and executed remotely to realize full system compromise.

The vulnerability is simply exploitable when the WC Fields Manufacturing facility plugin is concurrently lively, creating a particular assault vector that impacts a subset of the plugin’s consumer base.

Strive in-depth sandbox malware evaluation for your SOC group. Get ANY.RUN particular provide solely till Could 31 -> Strive Right here

Cyber Security News Tags:Cyberattack, Exposes, Plugin, Vulnerability, Websites, Wishlist, WooCommerce, WordPress

Post navigation

Previous Post: Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
Next Post: 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Related Posts

Web-to-App Funnels: Pros And Cons Cyber Security News
Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News
Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News
Cisco Desk, IP, and Video Phone Vulnerabilities Let Remote Attackers Trigger DoS And XSS Attacks Cyber Security News
Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark