Skip to main content

CVE-2025-39411: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Indie_Plugins WhatsApp Click to Chat Plugin for WordPress

High
VulnerabilityCVE-2025-39411cvecve-2025-39411cwe-98
Published: Mon May 19 2025 (05/19/2025, 18:58:01 UTC)
Source: CVE
Vendor/Project: Indie_Plugins
Product: WhatsApp Click to Chat Plugin for WordPress

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Indie_Plugins WhatsApp Click to Chat Plugin for WordPress.This issue affects WhatsApp Click to Chat Plugin for WordPress: from n/a through 2.2.12.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:18:45 UTC

Technical Analysis

CVE-2025-39411 is a high-severity vulnerability classified under CWE-98, which involves improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the Indie_Plugins WhatsApp Click to Chat Plugin for WordPress, versions up to and including 2.2.12. The flaw allows an attacker to perform a Remote File Inclusion (RFI) attack by manipulating the filename parameter that is used in PHP's include or require functions. This can lead to the execution of arbitrary PHP code hosted on a remote server controlled by the attacker. The vulnerability is exploitable remotely over the network without requiring authentication, though it requires some user interaction (e.g., visiting a crafted URL). The CVSS 3.1 base score of 7.5 reflects the high impact on confidentiality, integrity, and availability, with the attack vector being network-based, high attack complexity, no privileges required, and user interaction needed. Successful exploitation can result in full system compromise, including data theft, website defacement, malware installation, or pivoting to internal networks. The vulnerability arises from insufficient validation or sanitization of input used in dynamic PHP file inclusion, a common and dangerous weakness in PHP applications. No patches or fixes have been linked yet, and no known exploits are currently reported in the wild, but the potential for exploitation is significant given the widespread use of WordPress and the popularity of WhatsApp integration plugins.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for businesses and institutions relying on WordPress websites with the WhatsApp Click to Chat Plugin installed. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, or internal systems. The compromise of websites can damage brand reputation, result in regulatory penalties under GDPR for data breaches, and disrupt business operations through defacement or ransomware deployment. E-commerce platforms, governmental portals, and service providers using this plugin are particularly at risk. The ability to execute arbitrary code remotely without authentication increases the threat level, as attackers can automate attacks at scale. Additionally, compromised sites can be used as launchpads for further attacks against European networks or to distribute malware to European users, amplifying the impact.

Mitigation Recommendations

Immediate mitigation steps include auditing WordPress sites to identify installations of the vulnerable WhatsApp Click to Chat Plugin version 2.2.12 or earlier. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious include/require parameter manipulations can provide interim protection. Input validation and sanitization should be enforced at the application level to prevent malicious input from reaching PHP include statements. Monitoring web server logs for unusual requests targeting the plugin's PHP files can help detect attempted exploitation. Organizations should also ensure that WordPress core and all plugins are kept up to date and restrict file permissions to limit the impact of any successful code execution. Finally, preparing incident response plans specific to web application compromises will help minimize damage if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:58.198Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb432

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:18:45 PM

Last updated: 7/30/2025, 4:08:03 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats