Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49887: CWE-94 Improper Control of Generation of Code ('Code Injection') in WPFactory Product XML Feed Manager for WooCommerce

0
Critical
VulnerabilityCVE-2025-49887cvecve-2025-49887cwe-94
Published: Thu Aug 14 2025 (08/14/2025, 10:34:06 UTC)
Source: CVE Database V5
Vendor/Project: WPFactory
Product: Product XML Feed Manager for WooCommerce

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in WPFactory Product XML Feed Manager for WooCommerce allows Remote Code Inclusion. This issue affects Product XML Feed Manager for WooCommerce: from n/a through 2.9.3.

AI-Powered Analysis

AILast updated: 08/14/2025, 11:47:44 UTC

Technical Analysis

CVE-2025-49887 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the WPFactory Product XML Feed Manager plugin for WooCommerce, specifically versions up to 2.9.3. The flaw allows an attacker with at least low-level privileges (PR:L) to perform remote code inclusion (RCI) without requiring user interaction (UI:N). The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope of the vulnerability is changed (S:C), meaning the exploit can affect resources beyond the initially vulnerable component. Essentially, an attacker who can interact with the vulnerable plugin can inject malicious code that the system executes, potentially leading to full system compromise. This could allow attackers to execute arbitrary commands, access sensitive data, modify or delete data, and disrupt service availability. No public exploits are known at this time, and no patches have been published yet, increasing the urgency for organizations to monitor and prepare for mitigation once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those operating e-commerce platforms using WooCommerce with the WPFactory Product XML Feed Manager plugin. Given WooCommerce's popularity in Europe, many small to medium-sized enterprises (SMEs) and larger retailers could be affected. Exploitation could lead to data breaches involving customer information, financial data, and intellectual property, resulting in regulatory penalties under GDPR and loss of customer trust. The ability to execute arbitrary code remotely could also facilitate ransomware deployment or lateral movement within corporate networks, amplifying the damage. Disruption of e-commerce services could lead to direct financial losses and reputational harm. The critical severity and ease of exploitation without user interaction make this a high-priority threat for European businesses relying on this plugin.

Mitigation Recommendations

Immediate mitigation steps include auditing all WooCommerce installations to identify the presence of the WPFactory Product XML Feed Manager plugin and its version. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit the number of users with privileges capable of exploiting this vulnerability. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting XML feed endpoints. Monitor logs for unusual activity related to the plugin. Additionally, isolate the WooCommerce environment from critical internal networks to contain potential breaches. Once a patch is available, prioritize prompt testing and deployment. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:06:23.852Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee4ad5a09ad0059e62d

Added to database: 8/14/2025, 10:48:04 AM

Last enriched: 8/14/2025, 11:47:44 AM

Last updated: 10/17/2025, 9:18:11 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats