Skip to main content

CVE-2025-39364: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PluginEver Product Category Slider for WooCommerce

High
VulnerabilityCVE-2025-39364cvecve-2025-39364cwe-98
Published: Mon May 19 2025 (05/19/2025, 16:28:30 UTC)
Source: CVE
Vendor/Project: PluginEver
Product: Product Category Slider for WooCommerce

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginEver Product Category Slider for WooCommerce allows PHP Local File Inclusion.This issue affects Product Category Slider for WooCommerce: from n/a through 4.3.4.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:31:42 UTC

Technical Analysis

CVE-2025-39364 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP applications. This specific vulnerability affects the PluginEver Product Category Slider for WooCommerce, a popular WordPress plugin used to display product categories in a slider format on WooCommerce-based e-commerce sites. The vulnerability allows for PHP Remote File Inclusion (RFI) or potentially Local File Inclusion (LFI), enabling an attacker to manipulate the filename parameter used in PHP include or require statements. By exploiting this flaw, an attacker can cause the application to include and execute arbitrary PHP code from a remote or local source. This can lead to full compromise of the affected web server, including unauthorized code execution, data theft, website defacement, or pivoting to other internal systems. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). However, it has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact on confidentiality, integrity, and availability is rated high, reflecting the potential for complete system compromise. The affected versions include all releases up to 4.3.4, with no specific earliest version identified. No patches or known exploits in the wild have been reported at the time of publication (May 19, 2025). Given the widespread use of WooCommerce and the popularity of PluginEver’s slider plugin, this vulnerability poses a significant risk to e-commerce websites relying on this plugin for product display functionality.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the PluginEver Product Category Slider, this vulnerability presents a critical risk. Exploitation could lead to unauthorized access to customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of the website could be compromised, resulting in defacement or insertion of malicious content, damaging brand reputation and customer trust. Availability impacts could disrupt online sales and business operations, causing financial losses. Additionally, compromised servers could be used as launchpads for further attacks within corporate networks or to distribute malware to customers. The high severity and remote exploitability make this a pressing concern for European retailers and service providers relying on WordPress e-commerce solutions.

Mitigation Recommendations

1. Immediate action should include auditing all WooCommerce sites for the presence of the PluginEver Product Category Slider plugin and identifying versions up to 4.3.4. 2. Since no patch is currently available, consider temporarily disabling or uninstalling the plugin until a secure update is released. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as requests with unusual URL parameters or attempts to include remote files. 4. Restrict PHP configuration settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off') to reduce risk. 5. Harden server permissions to prevent unauthorized file access and execution. 6. Monitor web server logs for anomalous activity indicative of exploitation attempts. 7. Educate development and IT teams about secure coding practices to prevent improper input validation in include/require statements. 8. Plan for rapid deployment of vendor patches once available and subscribe to vulnerability advisories for timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:20.495Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb56e

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:31:42 PM

Last updated: 8/8/2025, 8:01:30 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats