A extreme safety flaw has been recognized within the TI WooCommerce Wishlist plugin, a broadly used WordPress extension with over 100,000 energetic installations.
This plugin allows WooCommerce retailer house owners to combine wishlist performance into their on-line outlets, typically alongside different extensions like WC Fields Manufacturing unit for enhanced type customization.
Nonetheless, the most recent model (2.9.2 as of this report) and all prior variations harbor an unauthenticated arbitrary file add vulnerability, tracked as CVE-2025-47577, posing a big risk to web sites using this instrument.
With no patched model at the moment accessible, customers are strongly suggested to deactivate and delete the plugin to safeguard their programs.
Unauthenticated File Add Vulnerability
The vulnerability stems from a vital oversight within the plugin’s code, particularly throughout the tinvwl_upload_file_wc_fields_factory
operate positioned within the integrations/wc-fields-factory.php
file.
This operate leverages WordPress’s wp_handle_upload
mechanism, which usually enforces file sort validation to stop the add of malicious content material.
Nonetheless, the plugin explicitly disables this safeguard by setting the parameter 'test_type' => false
, successfully permitting attackers to add any file sort, together with executable PHP scripts.
Such recordsdata can be utilized to attain distant code execution (RCE) by straight accessing the uploaded content material on the server.
Technical Breakdown of the Exploit
The exploit is accessible through helper features like tinvwl_meta_wc_fields_factory
or tinvwl_cart_meta_wc_fields_factory
, however it requires the WC Fields Manufacturing unit plugin to be energetic, narrowing the scope of exploitable setups but nonetheless leaving a substantial variety of web sites weak.
An attacker may exploit this flaw with none authentication, importing malicious code to compromise the server, steal knowledge, or disrupt operations, making this a high-severity challenge for affected WooCommerce shops.
The absence of a patch amplifies the urgency, as there isn’t any fast repair to mitigate the danger past full removing of the plugin.
For customers of Patchstack’s paid companies, safety in opposition to this vulnerability is already in place, offering a brief defend for these subscribed at a minimal value of $5 per web site per thirty days after signing up for a free Group account.
Plugin builders and internet hosting suppliers are additionally inspired to discover Patchstack’s safety audit companies and Enterprise API to bolster defenses at scale.
In the meantime, the broader WordPress group awaits an official replace from the TI WooCommerce Wishlist group, hoping for a decision to reinstate safe performance.
Till then, the beneficial plan of action stays clear: disable and uninstall the plugin to stop potential cyberattacks.
In a broader context, this incident underscores the significance of rigorous safety practices in plugin growth.
Based on the Report, The flawed implementation of bypassing WordPress’s default file validation serves as a cautionary story for builders, highlighting how a single misconfiguration can expose 1000’s of internet sites to exploitation.
For now, retailer house owners should stay vigilant, prioritizing safety over comfort, because the digital panorama continues to grapple with evolving cyber threats.
If a patched model emerges, updates will likely be communicated promptly to make sure customers can restore wishlist performance with out compromising security.
Discover this Information Attention-grabbing! Comply with us on Google Information, LinkedIn, & X to Get On the spot Updates!