CVE-2025-47687: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.
AI Analysis
Technical Summary
CVE-2025-47687 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The flaw allows an unauthenticated attacker to upload arbitrary files, including web shells, directly to the web server hosting the WooCommerce store. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, as an attacker gaining web shell access can execute arbitrary code, steal sensitive data, modify or delete content, and potentially disrupt services. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the initially compromised component, potentially leading to full system compromise. The plugin is widely used in e-commerce environments running on WordPress, which is a common platform in Europe. The absence of an official patch at the time of publication increases the risk for organizations relying on this plugin. Although no known exploits are currently reported in the wild, the critical CVSS score of 10 indicates that exploitation would have devastating consequences if weaponized.
Potential Impact
For European organizations, particularly those operating WooCommerce-based e-commerce platforms, this vulnerability poses a severe risk. Exploitation could lead to complete takeover of the web server, resulting in theft of customer data including payment information, disruption of online sales, and damage to brand reputation. Given the critical nature of e-commerce in the European digital economy and strict data protection regulations such as GDPR, a breach could also lead to significant regulatory fines and legal consequences. Additionally, compromised servers could be used as a pivot point for lateral movement within corporate networks, potentially affecting broader IT infrastructure. The vulnerability's ease of exploitation without authentication means attackers can rapidly target vulnerable stores across Europe, increasing the likelihood of widespread impact if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps should include disabling file upload functionality in the StoreKeeper plugin until a patch is released. Organizations should implement strict web application firewall (WAF) rules to block suspicious file upload attempts, especially those containing web shell signatures or uncommon file extensions. Employing content security policies (CSP) and restricting executable permissions on upload directories can reduce the risk of successful exploitation. Monitoring web server logs for unusual POST requests or file uploads is critical for early detection. Organizations should also isolate WooCommerce servers from critical internal networks to limit lateral movement in case of compromise. Once a patch is available, prompt application is essential. Additionally, conducting a thorough security audit and scanning for indicators of compromise related to web shells should be prioritized. Backup strategies must be reviewed to ensure rapid recovery if an attack occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47687: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce
Description
Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-47687 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The flaw allows an unauthenticated attacker to upload arbitrary files, including web shells, directly to the web server hosting the WooCommerce store. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems, as an attacker gaining web shell access can execute arbitrary code, steal sensitive data, modify or delete content, and potentially disrupt services. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the initially compromised component, potentially leading to full system compromise. The plugin is widely used in e-commerce environments running on WordPress, which is a common platform in Europe. The absence of an official patch at the time of publication increases the risk for organizations relying on this plugin. Although no known exploits are currently reported in the wild, the critical CVSS score of 10 indicates that exploitation would have devastating consequences if weaponized.
Potential Impact
For European organizations, particularly those operating WooCommerce-based e-commerce platforms, this vulnerability poses a severe risk. Exploitation could lead to complete takeover of the web server, resulting in theft of customer data including payment information, disruption of online sales, and damage to brand reputation. Given the critical nature of e-commerce in the European digital economy and strict data protection regulations such as GDPR, a breach could also lead to significant regulatory fines and legal consequences. Additionally, compromised servers could be used as a pivot point for lateral movement within corporate networks, potentially affecting broader IT infrastructure. The vulnerability's ease of exploitation without authentication means attackers can rapidly target vulnerable stores across Europe, increasing the likelihood of widespread impact if not mitigated promptly.
Mitigation Recommendations
Immediate mitigation steps should include disabling file upload functionality in the StoreKeeper plugin until a patch is released. Organizations should implement strict web application firewall (WAF) rules to block suspicious file upload attempts, especially those containing web shell signatures or uncommon file extensions. Employing content security policies (CSP) and restricting executable permissions on upload directories can reduce the risk of successful exploitation. Monitoring web server logs for unusual POST requests or file uploads is critical for early detection. Organizations should also isolate WooCommerce servers from critical internal networks to limit lateral movement in case of compromise. Once a patch is available, prompt application is essential. Additionally, conducting a thorough security audit and scanning for indicators of compromise related to web shells should be prioritized. Backup strategies must be reviewed to ensure rapid recovery if an attack occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:45:47.044Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a249272471
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 8:12:14 PM
Last updated: 8/18/2025, 11:30:14 PM
Views: 14
Related Threats
CVE-2025-53251: CWE-434 Unrestricted Upload of File with Dangerous Type in An-Themes Pin WP
CriticalCVE-2025-48956: CWE-400: Uncontrolled Resource Consumption in vllm-project vllm
HighCVE-2025-8607: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amans2k SlingBlocks – Gutenberg Blocks by FunnelKit (Formerly WooFunnels)
MediumCVE-2025-55383: n/a
UnknownCVE-2025-9303: Buffer Overflow in TOTOLINK A720R
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.