Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Posted on May 29, 2025May 29, 2025 By CWS

Might 29, 2025Ravie LakshmananVulnerability / Web site Safety
Cybersecurity researchers have disclosed a important unpatched safety flaw impacting TI WooCommerce Wishlist plugin for WordPress that may very well be exploited by unauthenticated attackers to add arbitrary information.
TI WooCommerce Wishlist, which has over 100,000 energetic installations, is a software to permit e-commerce web site prospects to save lots of their favourite merchandise for later and share the lists on social media platforms.
“The plugin is weak to an arbitrary file add vulnerability which permits attackers to add malicious information to the server with out authentication,” Patchstack researcher John Castro stated.
Tracked as CVE-2025-47577, the vulnerability carries a CVSS rating of 10.0. It impacts all variations of the plugin under and together with 2.9.2 launched on November 29, 2024. There may be at present no patch out there.
The web site safety firm stated the problem lies in a operate named “tinvwl_upload_file_wc_fields_factory,” which, in flip, makes use of one other native WordPress operate “wp_handle_upload” to carry out the validation, however units the override parameters “test_form” and “test_type” to “false.”

The “test_type” override is used to test whether or not the Multipurpose Web Mail Extension (MIME) kind of the file is as anticipated, whereas “test_form” is to test to confirm if the $_POST[‘action’] parameter is as anticipated.
In setting “test_type” to false, it permits the file kind validation to be successfully bypassed, thereby permitting any file kind to be uploaded.
That having stated, the weak operate is accessible by way of tinvwl_meta_wc_fields_factory or tinvwl_cart_meta_wc_fields_factory, that are solely out there when the WC Fields Manufacturing unit plugin is energetic.
This additionally signifies that profitable exploitation is barely doable if the WC Fields Manufacturing unit plugin is put in and activated on the WordPress web site and the combination is enabled on the TI WooCommerce Wishlist plugin.
In a hypothetical assault situation, a risk actor might add a malicious PHP file and obtain distant code execution (RCE) by instantly accessing the uploaded file.
Plugin builders are really helpful to take away or keep away from setting ‘test_type’ => false when utilizing wp_handle_upload(). Within the absence of a patch, customers of the plugin are urged to deactivate and delete the plugin from their websites.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Critical, CVSS, Plugin, Risk, Sites, Vulnerability, Wishlist, WordPress

Post navigation

Previous Post: ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger
Next Post: Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

Related Posts

Why Secrets in JavaScript Bundles are Still Being Missed Why Secrets in JavaScript Bundles are Still Being Missed The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status The Hacker News
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation The Hacker News
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker News
Securing CI/CD workflows with Wazuh Securing CI/CD workflows with Wazuh The Hacker News
Your Digital Footprint Can Lead Right to Your Front Door Your Digital Footprint Can Lead Right to Your Front Door The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News