Skip to main content

CVE-2025-48148: CWE-434 Unrestricted Upload of File with Dangerous Type in StoreKeeper B.V. StoreKeeper for WooCommerce

Critical
VulnerabilityCVE-2025-48148cvecve-2025-48148cwe-434
Published: Wed Aug 20 2025 (08/20/2025, 08:03:34 UTC)
Source: CVE Database V5
Vendor/Project: StoreKeeper B.V.
Product: StoreKeeper for WooCommerce

Description

Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Using Malicious Files. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4.

AI-Powered Analysis

AILast updated: 08/20/2025, 10:03:44 UTC

Technical Analysis

CVE-2025-48148 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the StoreKeeper for WooCommerce plugin developed by StoreKeeper B.V., specifically versions up to and including 14.4.4. The core issue is that the plugin does not properly restrict or validate the types of files that can be uploaded by users. This lack of validation allows an attacker to upload malicious files, such as web shells, scripts, or executables, which can then be executed on the server hosting the WooCommerce store. The vulnerability has a CVSS 3.1 base score of 10.0, indicating it is critical, with an attack vector of network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the affected system, potentially leading to data theft, site defacement, or complete server takeover. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the severity of impact makes this a highly dangerous vulnerability. The vulnerability is particularly concerning for e-commerce platforms using WooCommerce with the StoreKeeper plugin, as it could lead to financial fraud, theft of customer data, or disruption of business operations.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the StoreKeeper plugin, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive customer data, including payment information, violating GDPR and other data protection regulations, which could result in heavy fines and reputational damage. The integrity of the online store could be compromised, allowing attackers to manipulate product listings, prices, or inject malicious content that harms customers. Availability could also be impacted by attackers deploying ransomware or launching denial-of-service conditions through malicious uploads. Given the critical nature of the vulnerability and the widespread use of WooCommerce in Europe, affected organizations could face operational disruptions, loss of customer trust, and financial losses. Furthermore, the cross-site and network-wide impact (scope change) means that exploitation could affect multiple components or services beyond the plugin itself, amplifying the damage.

Mitigation Recommendations

Immediate mitigation steps include updating the StoreKeeper for WooCommerce plugin to a patched version once available, as no patch links are currently provided. Until a patch is released, organizations should implement strict file upload restrictions at the web server or application firewall level, such as blocking executable file extensions (e.g., .php, .exe, .js) and enforcing MIME type validation. Employing a web application firewall (WAF) with rules to detect and block suspicious upload attempts can reduce risk. Additionally, restricting upload permissions to authenticated and authorized users only, and implementing multi-factor authentication (MFA) for administrative access, can limit exploitation potential. Regularly monitoring logs for unusual file uploads or access patterns is critical for early detection. Organizations should also conduct security audits and penetration testing focused on file upload functionalities. Finally, isolating the upload directory with strict permissions and disabling script execution in that directory can prevent uploaded malicious files from being executed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:53.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b3ad5a09ad0002e291

Added to database: 8/20/2025, 8:17:55 AM

Last enriched: 8/20/2025, 10:03:44 AM

Last updated: 9/4/2025, 10:23:09 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats