Saturday, June 14, 2025
Advertisements

Critical WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk

by Charline

A severe security vulnerability in the widely used TI WooCommerce Wishlist plugin has exposed more than 100,000 WordPress websites to potential cyberattacks. Security experts warn that exploitation may already be underway.

The flaw, tracked as CVE-2025-47577, has received the highest possible severity rating with a CVSS score of 10.0. It allows unauthenticated attackers to upload arbitrary files to a site, potentially leading to full server compromise.

Advertisements

Widespread Risk With No Available Patch

The TI WooCommerce Wishlist plugin adds wishlist features to online stores built with WooCommerce. It is widely used by e-commerce websites globally. However, version 2.9.2 and all earlier versions are affected by this critical vulnerability.

As of now, the plugin’s developers have not released a patch. This leaves site administrators with few options other than to remove the plugin entirely to stay protected.

Patchstack, a cybersecurity firm, discovered the flaw during routine testing. The team contacted the plugin vendor on March 26, 2025, but received no response. On May 16, the vulnerability was added to Patchstack’s threat database, and a public advisory was issued on May 27.

Technical Details of the Exploit

The vulnerability exists in the plugin’s file upload handling, specifically in the tinvwl_upload_file_wc_fields_factory function. This function calls WordPress’s native wp_handle_upload but disables two key security checks.

function tinvwl_upload_file_wc_fields_factory( $file ) {
    if (!function_exists( 'wp_handle_upload' ) ) {
        require_once( ABSPATH . 'wp-admin/includes/file.php' );
    }
    $upload = wp_handle_upload(
        $file,
        [
            'test_form' => false,
            'test_type' => false,
        ]
    );
    return $upload;
}

The issue lies in the 'test_type' => false setting, which disables file type validation. This allows attackers to upload and execute malicious PHP files on the server, leading to a full takeover of the affected website.

Importantly, the vulnerability only becomes exploitable if the WC Fields Factory plugin is also installed and active. This creates a specific attack condition, but it still affects a significant number of websites.

Security Recommendations

Until a patch is released, cybersecurity professionals strongly advise website administrators to disable or remove the TI WooCommerce Wishlist plugin from their WordPress installations, especially if the WC Fields Factory plugin is also in use.

The situation highlights the ongoing risks associated with third-party WordPress plugins and the importance of responsive vendor communication in addressing security threats.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com