CVE-2025-47687: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.
AI Analysis
Technical Summary
CVE-2025-47687 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The flaw allows an unauthenticated attacker to upload arbitrary files, including web shells, directly to the web server hosting the WooCommerce store. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, as an attacker gaining web shell access can execute arbitrary code, steal sensitive data, modify or delete content, and potentially disrupt services. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the initially compromised component, potentially leading to full system compromise. The plugin is widely used in e-commerce environments running on WordPress, which is a common platform in Europe. The absence of an official patch at the time of publication increases the risk for organizations relying on this plugin. Although no known exploits are currently reported in the wild, the critical CVSS score of 10 indicates that exploitation would have devastating consequences if weaponized.
Potential Impact
For European organizations, particularly those operating WooCommerce-based e-commerce platforms, this vulnerability poses a severe risk. Exploitation could lead to complete takeover of the web server, resulting in theft of customer data including payment information, disruption of online sales, and damage to brand reputation. Given the critical nature of e-commerce in the European digital economy and strict data protection regulations such as GDPR, a breach could also lead to significant regulatory fines and legal consequences. Additionally, compromised servers could be used as a pivot point for lateral movement within corporate networks, potentially affecting broader IT infrastructure. The vulnerability's ease of exploitation without authentication means attackers can rapidly target vulnerable stores across Europe, increasing the likelihood of widespread impact if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps should include disabling file upload functionality in the StoreKeeper plugin until a patch is released. Organizations should implement strict web application firewall (WAF) rules to block suspicious file upload attempts, especially those containing web shell signatures or uncommon file extensions. Employing content security policies (CSP) and restricting executable permissions on upload directories can reduce the risk of successful exploitation. Monitoring web server logs for unusual POST requests or file uploads is critical for early detection. Organizations should also isolate WooCommerce servers from critical internal networks to limit lateral movement in case of compromise. Once a patch is available, prompt application is essential. Additionally, conducting a thorough security audit and scanning for indicators of compromise related to web shells should be prioritized. Backup strategies must be reviewed to ensure rapid recovery if an attack occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47687: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce
Description
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-47687 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The flaw allows an unauthenticated attacker to upload arbitrary files, including web shells, directly to the web server hosting the WooCommerce store. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, as an attacker gaining web shell access can execute arbitrary code, steal sensitive data, modify or delete content, and potentially disrupt services. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the initially compromised component, potentially leading to full system compromise. The plugin is widely used in e-commerce environments running on WordPress, which is a common platform in Europe. The absence of an official patch at the time of publication increases the risk for organizations relying on this plugin. Although no known exploits are currently reported in the wild, the critical CVSS score of 10 indicates that exploitation would have devastating consequences if weaponized.
Potential Impact
For European organizations, particularly those operating WooCommerce-based e-commerce platforms, this vulnerability poses a severe risk. Exploitation could lead to complete takeover of the web server, resulting in theft of customer data including payment information, disruption of online sales, and damage to brand reputation. Given the critical nature of e-commerce in the European digital economy and strict data protection regulations such as GDPR, a breach could also lead to significant regulatory fines and legal consequences. Additionally, compromised servers could be used as a pivot point for lateral movement within corporate networks, potentially affecting broader IT infrastructure. The vulnerability's ease of exploitation without authentication means attackers can rapidly target vulnerable stores across Europe, increasing the likelihood of widespread impact if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps should include disabling file upload functionality in the StoreKeeper plugin until a patch is released. Organizations should implement strict web application firewall (WAF) rules to block suspicious file upload attempts, especially those containing web shell signatures or uncommon file extensions. Employing content security policies (CSP) and restricting executable permissions on upload directories can reduce the risk of successful exploitation. Monitoring web server logs for unusual POST requests or file uploads is critical for early detection. Organizations should also isolate WooCommerce servers from critical internal networks to limit lateral movement in case of compromise. Once a patch is available, prompt application is essential. Additionally, conducting a thorough security audit and scanning for indicators of compromise related to web shells should be prioritized. Backup strategies must be reviewed to ensure rapid recovery if an attack occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:47.044Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a249272471
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 8:12:14 PM
Last updated: 10/7/2025, 1:47:11 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.