CVE-2025-47577: CWE-434 Unrestricted Upload of File with Dangerous Type in TemplateInvaders TI WooCommerce Wishlist
Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a before 2.10.0.
AI Analysis
Technical Summary
CVE-2025-47577 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the TemplateInvaders TI WooCommerce Wishlist plugin, a popular extension used in WooCommerce-based e-commerce websites to manage customer wishlists. The flaw allows an unauthenticated attacker to upload arbitrary files, including malicious web shells, directly to the web server hosting the vulnerable plugin. Since the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, allowing attackers to execute arbitrary code, take over the web server, steal sensitive data, modify or delete content, and potentially pivot to internal networks. The vulnerability affects all versions of TI WooCommerce Wishlist before 2.10.0, with no specific version exclusions noted. The CVSS v3.1 base score is 10.0, indicating a critical severity level. Although no known exploits are reported in the wild yet, the nature of the vulnerability and the widespread use of WooCommerce plugins make it a high-risk target for attackers. The lack of a patch link suggests that a fix may be pending or recently released but not yet widely distributed. This vulnerability is particularly dangerous because web shells provide persistent backdoor access, enabling long-term compromise and lateral movement within affected environments.
Potential Impact
For European organizations, the impact of CVE-2025-47577 could be severe, especially for e-commerce businesses relying on WooCommerce and the TI WooCommerce Wishlist plugin. Successful exploitation can lead to full server compromise, exposing customer data including personal and payment information, which would violate GDPR regulations and result in significant legal and financial penalties. The integrity of e-commerce platforms can be undermined, leading to loss of customer trust and revenue. Additionally, compromised servers can be used as launchpads for further attacks, including ransomware deployment or supply chain attacks targeting European partners. The availability of the e-commerce service may be disrupted, causing operational downtime during remediation. Given the criticality and ease of exploitation, organizations face a heightened risk of data breaches and service interruptions.
Mitigation Recommendations
European organizations should immediately verify if they use the TI WooCommerce Wishlist plugin and identify the version in use. If the version is prior to 2.10.0, they should upgrade to the latest patched version as soon as it becomes available. Until a patch is applied, organizations should implement strict web application firewall (WAF) rules to block file upload attempts with suspicious or executable file extensions and monitor upload directories for unauthorized files. Restricting file upload permissions and isolating upload directories from execution privileges can reduce risk. Conduct thorough security audits and scanning for web shells or other malicious artifacts on web servers. Employ intrusion detection systems (IDS) and continuous monitoring to detect anomalous activities. Additionally, organizations should review and harden their overall WordPress and WooCommerce security posture, including limiting plugin usage to trusted sources, enforcing least privilege principles on server accounts, and maintaining regular backups with offline copies to enable recovery from compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-47577: CWE-434 Unrestricted Upload of File with Dangerous Type in TemplateInvaders TI WooCommerce Wishlist
Description
Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a before 2.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-47577 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the TemplateInvaders TI WooCommerce Wishlist plugin, a popular extension used in WooCommerce-based e-commerce websites to manage customer wishlists. The flaw allows an unauthenticated attacker to upload arbitrary files, including malicious web shells, directly to the web server hosting the vulnerable plugin. Since the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, allowing attackers to execute arbitrary code, take over the web server, steal sensitive data, modify or delete content, and potentially pivot to internal networks. The vulnerability affects all versions of TI WooCommerce Wishlist before 2.10.0, with no specific version exclusions noted. The CVSS v3.1 base score is 10.0, indicating a critical severity level. Although no known exploits are reported in the wild yet, the nature of the vulnerability and the widespread use of WooCommerce plugins make it a high-risk target for attackers. The lack of a patch link suggests that a fix may be pending or recently released but not yet widely distributed. This vulnerability is particularly dangerous because web shells provide persistent backdoor access, enabling long-term compromise and lateral movement within affected environments.
Potential Impact
For European organizations, the impact of CVE-2025-47577 could be severe, especially for e-commerce businesses relying on WooCommerce and the TI WooCommerce Wishlist plugin. Successful exploitation can lead to full server compromise, exposing customer data including personal and payment information, which would violate GDPR regulations and result in significant legal and financial penalties. The integrity of e-commerce platforms can be undermined, leading to loss of customer trust and revenue. Additionally, compromised servers can be used as launchpads for further attacks, including ransomware deployment or supply chain attacks targeting European partners. The availability of the e-commerce service may be disrupted, causing operational downtime during remediation. Given the criticality and ease of exploitation, organizations face a heightened risk of data breaches and service interruptions.
Mitigation Recommendations
European organizations should immediately verify if they use the TI WooCommerce Wishlist plugin and identify the version in use. If the version is prior to 2.10.0, they should upgrade to the latest patched version as soon as it becomes available. Until a patch is applied, organizations should implement strict web application firewall (WAF) rules to block file upload attempts with suspicious or executable file extensions and monitor upload directories for unauthorized files. Restricting file upload permissions and isolating upload directories from execution privileges can reduce risk. Conduct thorough security audits and scanning for web shells or other malicious artifacts on web servers. Employ intrusion detection systems (IDS) and continuous monitoring to detect anomalous activities. Additionally, organizations should review and harden their overall WordPress and WooCommerce security posture, including limiting plugin usage to trusted sources, enforcing least privilege principles on server accounts, and maintaining regular backups with offline copies to enable recovery from compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:55:31.577Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb4b2
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 3:02:44 AM
Last updated: 7/14/2025, 3:16:49 AM
Views: 12
Related Threats
CVE-2025-7614: Command Injection in TOTOLINK T6
MediumCVE-2025-7613: Command Injection in TOTOLINK T6
MediumCVE-2025-7612: SQL Injection in code-projects Mobile Shop
MediumCVE-2025-7611: SQL Injection in code-projects Wedding Reservation
MediumCVE-2025-50756: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.