CVE-2025-49887: CWE-94 Improper Control of Generation of Code ('Code Injection') in WPFactory Product XML Feed Manager for WooCommerce
Improper Control of Generation of Code ('Code Injection') vulnerability in WPFactory Product XML Feed Manager for WooCommerce allows Remote Code Inclusion. This issue affects Product XML Feed Manager for WooCommerce: from n/a through 2.9.3.
AI Analysis
Technical Summary
CVE-2025-49887 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the WPFactory Product XML Feed Manager plugin for WooCommerce, specifically versions up to 2.9.3. The flaw allows an attacker with at least low-level privileges (PR:L) to perform remote code inclusion (RCI) without requiring user interaction (UI:N). The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope of the vulnerability is changed (S:C), meaning the exploit can affect resources beyond the initially vulnerable component. Essentially, an attacker who can interact with the vulnerable plugin can inject malicious code that the system executes, potentially leading to full system compromise. This could allow attackers to execute arbitrary commands, access sensitive data, modify or delete data, and disrupt service availability. No public exploits are known at this time, and no patches have been published yet, increasing the urgency for organizations to monitor and prepare for mitigation once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating e-commerce platforms using WooCommerce with the WPFactory Product XML Feed Manager plugin. Given WooCommerce's popularity in Europe, many small to medium-sized enterprises (SMEs) and larger retailers could be affected. Exploitation could lead to data breaches involving customer information, financial data, and intellectual property, resulting in regulatory penalties under GDPR and loss of customer trust. The ability to execute arbitrary code remotely could also facilitate ransomware deployment or lateral movement within corporate networks, amplifying the damage. Disruption of e-commerce services could lead to direct financial losses and reputational harm. The critical severity and ease of exploitation without user interaction make this a high-priority threat for European businesses relying on this plugin.
Mitigation Recommendations
Immediate mitigation steps include auditing all WooCommerce installations to identify the presence of the WPFactory Product XML Feed Manager plugin and its version. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit the number of users with privileges capable of exploiting this vulnerability. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting XML feed endpoints. Monitor logs for unusual activity related to the plugin. Additionally, isolate the WooCommerce environment from critical internal networks to contain potential breaches. Once a patch is available, prioritize prompt testing and deployment. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49887: CWE-94 Improper Control of Generation of Code ('Code Injection') in WPFactory Product XML Feed Manager for WooCommerce
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in WPFactory Product XML Feed Manager for WooCommerce allows Remote Code Inclusion. This issue affects Product XML Feed Manager for WooCommerce: from n/a through 2.9.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-49887 is a critical vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the WPFactory Product XML Feed Manager plugin for WooCommerce, specifically versions up to 2.9.3. The flaw allows an attacker with at least low-level privileges (PR:L) to perform remote code inclusion (RCI) without requiring user interaction (UI:N). The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), and it impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope of the vulnerability is changed (S:C), meaning the exploit can affect resources beyond the initially vulnerable component. Essentially, an attacker who can interact with the vulnerable plugin can inject malicious code that the system executes, potentially leading to full system compromise. This could allow attackers to execute arbitrary commands, access sensitive data, modify or delete data, and disrupt service availability. No public exploits are known at this time, and no patches have been published yet, increasing the urgency for organizations to monitor and prepare for mitigation once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating e-commerce platforms using WooCommerce with the WPFactory Product XML Feed Manager plugin. Given WooCommerce's popularity in Europe, many small to medium-sized enterprises (SMEs) and larger retailers could be affected. Exploitation could lead to data breaches involving customer information, financial data, and intellectual property, resulting in regulatory penalties under GDPR and loss of customer trust. The ability to execute arbitrary code remotely could also facilitate ransomware deployment or lateral movement within corporate networks, amplifying the damage. Disruption of e-commerce services could lead to direct financial losses and reputational harm. The critical severity and ease of exploitation without user interaction make this a high-priority threat for European businesses relying on this plugin.
Mitigation Recommendations
Immediate mitigation steps include auditing all WooCommerce installations to identify the presence of the WPFactory Product XML Feed Manager plugin and its version. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit the number of users with privileges capable of exploiting this vulnerability. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting XML feed endpoints. Monitor logs for unusual activity related to the plugin. Additionally, isolate the WooCommerce environment from critical internal networks to contain potential breaches. Once a patch is available, prioritize prompt testing and deployment. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-11T16:06:23.852Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689dbee4ad5a09ad0059e62d
Added to database: 8/14/2025, 10:48:04 AM
Last enriched: 8/14/2025, 11:47:44 AM
Last updated: 10/17/2025, 9:18:11 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62645: CWE-266 Incorrect Privilege Assignment in Restaurant Brands International assistant platform
CriticalCVE-2025-62644: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Restaurant Brands International assistant platform
MediumCVE-2025-62643: CWE-319 Cleartext Transmission of Sensitive Information in Restaurant Brands International assistant platform
LowCVE-2025-62508: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in StarCitizenTools mediawiki-skins-Citizen
MediumCVE-2025-62646: CWE-669 Incorrect Resource Transfer Between Spheres in Restaurant Brands International assistant platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.