CVE-2025-13088: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Category and Product Woocommerce Tabs
The Category and Product Woocommerce Tabs plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0. This is due to insufficient input validation on the 'template' parameter in the categoryProductTab() function. This makes it possible for authenticated attackers, with contributor level access and above, to include and execute arbitrary .php files on the server.
AI Analysis
Technical Summary
CVE-2025-13088 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Category and Product Woocommerce Tabs plugin for WordPress developed by ikhodal. The vulnerability stems from improper control of the filename used in an include or require statement within the plugin's categoryProductTab() function. Specifically, the 'template' parameter is not properly validated, allowing an attacker with authenticated access at the contributor level or above to manipulate this parameter to include arbitrary PHP files from the server. This can lead to remote code execution, as the included files are executed in the context of the web server. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation by authenticated users make it a critical concern for WordPress sites using this plugin. The flaw allows attackers to escalate privileges and potentially take over the entire web server, compromising sensitive data and service availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating e-commerce websites using WordPress with the affected plugin. An attacker with contributor-level access—which is commonly granted to content creators or editors—can execute arbitrary PHP code, potentially leading to full server compromise. This could result in data breaches involving customer information, financial data, and intellectual property. Additionally, attackers could deface websites, disrupt services, or use compromised servers as a foothold for further attacks within the organization's network. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and financial losses. Given the widespread use of WooCommerce in Europe, the vulnerability could affect a broad range of small to medium-sized enterprises that rely on this plugin for product display and management.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to the minimum necessary, avoiding granting contributor access to untrusted users. 2. Monitor web server logs and WordPress activity logs for suspicious usage of the 'template' parameter or unexpected file inclusions. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'template' parameter for file inclusion. 4. Disable or remove the Category and Product Woocommerce Tabs plugin if it is not essential to business operations until a patch is released. 5. Once available, promptly apply official security patches or updates from the plugin vendor. 6. Conduct regular security audits of WordPress plugins and user roles to ensure no unnecessary privileges are granted. 7. Employ file integrity monitoring to detect unauthorized changes to PHP files on the server. 8. Consider isolating WordPress instances in containerized or sandboxed environments to limit the blast radius of potential exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13088: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Category and Product Woocommerce Tabs
Description
The Category and Product Woocommerce Tabs plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0. This is due to insufficient input validation on the 'template' parameter in the categoryProductTab() function. This makes it possible for authenticated attackers, with contributor level access and above, to include and execute arbitrary .php files on the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-13088 is a Local File Inclusion vulnerability classified under CWE-98, affecting the Category and Product Woocommerce Tabs plugin for WordPress developed by ikhodal. The vulnerability stems from improper control of the filename used in an include or require statement within the plugin's categoryProductTab() function. Specifically, the 'template' parameter is not properly validated, allowing an attacker with authenticated access at the contributor level or above to manipulate this parameter to include arbitrary PHP files from the server. This can lead to remote code execution, as the included files are executed in the context of the web server. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation by authenticated users make it a critical concern for WordPress sites using this plugin. The flaw allows attackers to escalate privileges and potentially take over the entire web server, compromising sensitive data and service availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating e-commerce websites using WordPress with the affected plugin. An attacker with contributor-level access—which is commonly granted to content creators or editors—can execute arbitrary PHP code, potentially leading to full server compromise. This could result in data breaches involving customer information, financial data, and intellectual property. Additionally, attackers could deface websites, disrupt services, or use compromised servers as a foothold for further attacks within the organization's network. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and financial losses. Given the widespread use of WooCommerce in Europe, the vulnerability could affect a broad range of small to medium-sized enterprises that rely on this plugin for product display and management.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to the minimum necessary, avoiding granting contributor access to untrusted users. 2. Monitor web server logs and WordPress activity logs for suspicious usage of the 'template' parameter or unexpected file inclusions. 3. Implement Web Application Firewall (WAF) rules to detect and block attempts to exploit the 'template' parameter for file inclusion. 4. Disable or remove the Category and Product Woocommerce Tabs plugin if it is not essential to business operations until a patch is released. 5. Once available, promptly apply official security patches or updates from the plugin vendor. 6. Conduct regular security audits of WordPress plugins and user roles to ensure no unnecessary privileges are granted. 7. Employ file integrity monitoring to detect unauthorized changes to PHP files on the server. 8. Consider isolating WordPress instances in containerized or sandboxed environments to limit the blast radius of potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-12T19:49:07.750Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c305b35a0ab0a5627107b
Added to database: 11/18/2025, 8:37:47 AM
Last enriched: 11/25/2025, 9:47:25 AM
Last updated: 1/7/2026, 8:55:21 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.