Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60191: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce Wishlist for WooCommerce

0
High
VulnerabilityCVE-2025-60191cvecve-2025-60191
Published: Thu Nov 06 2025 (11/06/2025, 15:54:48 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce Wishlist for WooCommerce

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce Wishlist for WooCommerce premmerce-woocommerce-wishlist allows PHP Local File Inclusion.This issue affects Premmerce Wishlist for WooCommerce: from n/a through <= 1.1.10.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:24:13 UTC

Technical Analysis

CVE-2025-60191 is a vulnerability classified as improper control of filename for include/require statements in PHP programs, specifically affecting the Premmerce Wishlist for WooCommerce plugin versions up to 1.1.10. This vulnerability allows an attacker to exploit a Local File Inclusion (LFI) flaw by manipulating the filename parameter used in PHP include or require functions. LFI vulnerabilities occur when user input is not properly sanitized or validated before being used in file inclusion operations, enabling attackers to include arbitrary files from the server's filesystem. This can lead to remote code execution if the attacker can include files containing malicious code or sensitive information disclosure if system files are included. The CVSS v3.1 score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. Although no exploits are currently known in the wild, the vulnerability’s characteristics suggest it could be leveraged by attackers to compromise affected systems. The lack of a patch link indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of their e-commerce platforms running WooCommerce with the Premmerce Wishlist plugin. Exploitation could allow attackers to execute arbitrary code or manipulate site functionality, potentially leading to unauthorized transactions, data tampering, or further compromise of backend systems. While confidentiality and availability impacts are not directly indicated, the integrity breach alone can undermine customer trust, cause financial losses, and damage brand reputation. Given the widespread use of WooCommerce in Europe’s e-commerce sector, especially in countries with mature online retail markets, the threat could affect a large number of businesses. Additionally, attackers could leverage this vulnerability as a foothold for lateral movement within corporate networks. The absence of required authentication and user interaction means that automated attacks or scanning could rapidly identify and exploit vulnerable installations, increasing the urgency for European organizations to respond.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to identify the presence of the Premmerce Wishlist plugin and its version. If version 1.1.10 or earlier is detected, the plugin should be disabled or removed until a security patch is released. In the interim, implement strict web application firewall (WAF) rules to block suspicious requests attempting to manipulate include/require parameters. Restrict PHP file inclusion paths using configuration directives such as open_basedir to limit accessible files to trusted directories. Conduct thorough logging and monitoring for anomalous file inclusion attempts or unexpected PHP errors. Developers should review and sanitize all user inputs related to file inclusion, employing whitelisting of allowed files rather than blacklisting. Regularly check for updates from the vendor and apply patches promptly once available. Additionally, consider isolating the affected web applications in segmented network zones to reduce potential lateral movement if exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.981Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc801ca26fb4dd2f593f0

Added to database: 11/6/2025, 4:08:33 PM

Last enriched: 11/13/2025, 5:24:13 PM

Last updated: 11/22/2025, 6:05:29 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats