Skip to main content

CVE-2025-47687: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce

Critical
VulnerabilityCVE-2025-47687cvecve-2025-47687cwe-434
Published: Fri May 23 2025 (05/23/2025, 12:43:18 UTC)
Source: CVE
Vendor/Project: StoreKeeper B.V.
Product: StoreKeeper for WooCommerce

Description

Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:12:14 UTC

Technical Analysis

CVE-2025-47687 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The flaw allows an unauthenticated attacker to upload arbitrary files, including web shells, directly to the web server hosting the WooCommerce store. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, as an attacker gaining web shell access can execute arbitrary code, steal sensitive data, modify or delete content, and potentially disrupt services. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the initially compromised component, potentially leading to full system compromise. The plugin is widely used in e-commerce environments running on WordPress, which is a common platform in Europe. The absence of an official patch at the time of publication increases the risk for organizations relying on this plugin. Although no known exploits are currently reported in the wild, the critical CVSS score of 10 indicates that exploitation would have devastating consequences if weaponized.

Potential Impact

For European organizations, particularly those operating WooCommerce-based e-commerce platforms, this vulnerability poses a severe risk. Exploitation could lead to complete takeover of the web server, resulting in theft of customer data including payment information, disruption of online sales, and damage to brand reputation. Given the critical nature of e-commerce in the European digital economy and strict data protection regulations such as GDPR, a breach could also lead to significant regulatory fines and legal consequences. Additionally, compromised servers could be used as a pivot point for lateral movement within corporate networks, potentially affecting broader IT infrastructure. The vulnerability's ease of exploitation without authentication means attackers can rapidly target vulnerable stores across Europe, increasing the likelihood of widespread impact if not mitigated promptly.

Mitigation Recommendations

Immediate mitigation steps should include disabling file upload functionality in the StoreKeeper plugin until a patch is released. Organizations should implement strict web application firewall (WAF) rules to block suspicious file upload attempts, especially those containing web shell signatures or uncommon file extensions. Employing content security policies (CSP) and restricting executable permissions on upload directories can reduce the risk of successful exploitation. Monitoring web server logs for unusual POST requests or file uploads is critical for early detection. Organizations should also isolate WooCommerce servers from critical internal networks to limit lateral movement in case of compromise. Once a patch is available, prompt application is essential. Additionally, conducting a thorough security audit and scanning for indicators of compromise related to web shells should be prioritized. Backup strategies must be reviewed to ensure rapid recovery if an attack occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T10:45:47.044Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a249272471

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 8:12:14 PM

Last updated: 8/18/2025, 11:30:14 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats