CVE-2025-39364: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PluginEver Product Category Slider for WooCommerce
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginEver Product Category Slider for WooCommerce allows PHP Local File Inclusion.This issue affects Product Category Slider for WooCommerce: from n/a through 4.3.4.
AI Analysis
Technical Summary
CVE-2025-39364 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP applications. This specific vulnerability affects the PluginEver Product Category Slider for WooCommerce, a popular WordPress plugin used to display product categories in a slider format on WooCommerce-based e-commerce sites. The vulnerability allows for PHP Remote File Inclusion (RFI) or potentially Local File Inclusion (LFI), enabling an attacker to manipulate the filename parameter used in PHP include or require statements. By exploiting this flaw, an attacker can cause the application to include and execute arbitrary PHP code from a remote or local source. This can lead to full compromise of the affected web server, including unauthorized code execution, data theft, website defacement, or pivoting to other internal systems. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). However, it has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact on confidentiality, integrity, and availability is rated high, reflecting the potential for complete system compromise. The affected versions include all releases up to 4.3.4, with no specific earliest version identified. No patches or known exploits in the wild have been reported at the time of publication (May 19, 2025). Given the widespread use of WooCommerce and the popularity of PluginEver’s slider plugin, this vulnerability poses a significant risk to e-commerce websites relying on this plugin for product display functionality.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the PluginEver Product Category Slider, this vulnerability presents a critical risk. Exploitation could lead to unauthorized access to customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of the website could be compromised, resulting in defacement or insertion of malicious content, damaging brand reputation and customer trust. Availability impacts could disrupt online sales and business operations, causing financial losses. Additionally, compromised servers could be used as launchpads for further attacks within corporate networks or to distribute malware to customers. The high severity and remote exploitability make this a pressing concern for European retailers and service providers relying on WordPress e-commerce solutions.
Mitigation Recommendations
1. Immediate action should include auditing all WooCommerce sites for the presence of the PluginEver Product Category Slider plugin and identifying versions up to 4.3.4. 2. Since no patch is currently available, consider temporarily disabling or uninstalling the plugin until a secure update is released. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as requests with unusual URL parameters or attempts to include remote files. 4. Restrict PHP configuration settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off') to reduce risk. 5. Harden server permissions to prevent unauthorized file access and execution. 6. Monitor web server logs for anomalous activity indicative of exploitation attempts. 7. Educate development and IT teams about secure coding practices to prevent improper input validation in include/require statements. 8. Plan for rapid deployment of vendor patches once available and subscribe to vulnerability advisories for timely updates.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-39364: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in PluginEver Product Category Slider for WooCommerce
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginEver Product Category Slider for WooCommerce allows PHP Local File Inclusion.This issue affects Product Category Slider for WooCommerce: from n/a through 4.3.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-39364 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements in PHP applications. This specific vulnerability affects the PluginEver Product Category Slider for WooCommerce, a popular WordPress plugin used to display product categories in a slider format on WooCommerce-based e-commerce sites. The vulnerability allows for PHP Remote File Inclusion (RFI) or potentially Local File Inclusion (LFI), enabling an attacker to manipulate the filename parameter used in PHP include or require statements. By exploiting this flaw, an attacker can cause the application to include and execute arbitrary PHP code from a remote or local source. This can lead to full compromise of the affected web server, including unauthorized code execution, data theft, website defacement, or pivoting to other internal systems. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). However, it has a high attack complexity (AC:H), indicating some conditions must be met for successful exploitation. The impact on confidentiality, integrity, and availability is rated high, reflecting the potential for complete system compromise. The affected versions include all releases up to 4.3.4, with no specific earliest version identified. No patches or known exploits in the wild have been reported at the time of publication (May 19, 2025). Given the widespread use of WooCommerce and the popularity of PluginEver’s slider plugin, this vulnerability poses a significant risk to e-commerce websites relying on this plugin for product display functionality.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the PluginEver Product Category Slider, this vulnerability presents a critical risk. Exploitation could lead to unauthorized access to customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of the website could be compromised, resulting in defacement or insertion of malicious content, damaging brand reputation and customer trust. Availability impacts could disrupt online sales and business operations, causing financial losses. Additionally, compromised servers could be used as launchpads for further attacks within corporate networks or to distribute malware to customers. The high severity and remote exploitability make this a pressing concern for European retailers and service providers relying on WordPress e-commerce solutions.
Mitigation Recommendations
1. Immediate action should include auditing all WooCommerce sites for the presence of the PluginEver Product Category Slider plugin and identifying versions up to 4.3.4. 2. Since no patch is currently available, consider temporarily disabling or uninstalling the plugin until a secure update is released. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as requests with unusual URL parameters or attempts to include remote files. 4. Restrict PHP configuration settings to disable remote file inclusion (e.g., setting 'allow_url_include' to 'Off' and 'allow_url_fopen' to 'Off') to reduce risk. 5. Harden server permissions to prevent unauthorized file access and execution. 6. Monitor web server logs for anomalous activity indicative of exploitation attempts. 7. Educate development and IT teams about secure coding practices to prevent improper input validation in include/require statements. 8. Plan for rapid deployment of vendor patches once available and subscribe to vulnerability advisories for timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-16T06:22:20.495Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb56e
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:31:42 PM
Last updated: 8/8/2025, 8:01:30 AM
Views: 12
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.