HomeVulnerabilityOver 100,000 WordPress Websites at Threat from Important CVSS 10.0 Vulnerability in...

Over 100,000 WordPress Websites at Threat from Important CVSS 10.0 Vulnerability in Wishlist Plugin

Cybersecurity researchers have disclosed a crucial unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could possibly be exploited by unauthenticated attackers to add arbitrary information.

TI WooCommerce Wishlist, which has over 100,000 energetic installations, is a instrument to permit e-commerce website prospects to save lots of their favourite merchandise for later and share the lists on social media platforms.

“The plugin is weak to an arbitrary file add vulnerability which permits attackers to add malicious information to the server with out authentication,” Patchstack researcher John Castro stated.

Tracked as CVE-2025-47577, the vulnerability carries a CVSS rating of 10.0. It impacts all variations of the plugin beneath and together with 2.9.2 launched on November 29, 2024. There’s at the moment no patch out there.

The web site security firm stated the difficulty lies in a perform named “tinvwl_upload_file_wc_fields_factory,” which, in flip, makes use of one other native WordPress perform “wp_handle_upload” to carry out the validation, however units the override parameters “test_form” and “test_type” to “false.”

Cybersecurity

The “test_type” override is used to test whether or not the Multipurpose Web Mail Extension (MIME) sort of the file is as anticipated, whereas “test_form” is to test to confirm if the $_POST[‘action’] parameter is as anticipated.

See also  CISOs and CIOs forge important partnerships for enterprise success

In setting “test_type” to false, it permits the file sort validation to be successfully bypassed, thereby permitting any file sort to be uploaded.

That having stated, the weak perform is accessible by way of tinvwl_meta_wc_fields_factory or tinvwl_cart_meta_wc_fields_factory, that are solely out there when the WC Fields Manufacturing unit plugin is energetic.

This additionally implies that profitable exploitation is just potential if the WC Fields Manufacturing unit plugin is put in and activated on the WordPress website and the combination is enabled on the TI WooCommerce Wishlist plugin.

In a hypothetical assault state of affairs, a risk actor might add a malicious PHP file and obtain distant code execution (RCE) by immediately accessing the uploaded file.

Plugin builders are really useful to take away or keep away from setting ‘test_type’ => false when utilizing wp_handle_upload(). Within the absence of a patch, customers of the plugin are urged to deactivate and delete the plugin from their websites.

See also  Microsoft Patches Delicate Data Disclosure Vulnerability in Azure CLI

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular