Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60194: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Premmerce Premmerce Product Search for WooCommerce

0
High
VulnerabilityCVE-2025-60194cvecve-2025-60194
Published: Thu Nov 06 2025 (11/06/2025, 15:54:50 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce Product Search for WooCommerce

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Premmerce Premmerce Product Search for WooCommerce premmerce-search allows PHP Local File Inclusion.This issue affects Premmerce Product Search for WooCommerce: from n/a through <= 2.2.4.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:46:23 UTC

Technical Analysis

CVE-2025-60194 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a PHP Remote File Inclusion (RFI) flaw, found in the Premmerce Product Search plugin for WooCommerce. This vulnerability arises because the plugin fails to properly validate or sanitize user-supplied input used in PHP include or require statements, allowing an attacker to specify a remote file to be included and executed by the server. The affected versions include all versions up to and including 2.2.4. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. Exploiting this vulnerability enables an attacker to execute arbitrary PHP code on the server hosting the WooCommerce site, which can lead to full compromise of the web application, data manipulation, or pivoting into the internal network. The CVSS v3.1 base score is 7.5, reflecting high impact on integrity with no impact on confidentiality or availability. No public exploits are known at this time, but the nature of the vulnerability makes it a prime candidate for future exploitation. The vulnerability was reserved in late September 2025 and published in early November 2025. The lack of available patches or updates at the time of disclosure increases the urgency for mitigation.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Product Search plugin, this vulnerability poses a significant risk. Successful exploitation can lead to arbitrary code execution, allowing attackers to manipulate product data, inject malicious content, steal sensitive customer information, or disrupt business operations. The integrity of the e-commerce platform is directly threatened, potentially damaging brand reputation and customer trust. Additionally, attackers could leverage compromised servers as footholds for further attacks within corporate networks or to launch supply chain attacks. Given the widespread use of WooCommerce in Europe and the critical role of e-commerce in the European economy, the impact could be substantial. Organizations in sectors such as retail, logistics, and financial services that rely on WooCommerce storefronts are particularly vulnerable. The lack of authentication requirements and the remote exploitability increase the likelihood of attacks, especially in countries with high WooCommerce market penetration.

Mitigation Recommendations

European organizations should immediately audit their WooCommerce installations to identify the use of the Premmerce Product Search plugin and verify the version in use. If running version 2.2.4 or earlier, they should prioritize upgrading to a patched version once available from the vendor. In the absence of an official patch, organizations should consider temporarily disabling the plugin or removing it entirely to eliminate the attack surface. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as requests containing remote URLs or unusual parameters in include/require statements. Additionally, organizations should implement strict input validation and sanitization on all user-supplied data, especially parameters that influence file inclusion. Monitoring web server logs for anomalous requests and signs of exploitation attempts is critical. Network segmentation and least privilege principles should be enforced to limit the potential damage of a compromised web server. Finally, organizations should stay informed about vendor updates and threat intelligence related to this vulnerability for timely response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:34.981Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc809ca26fb4dd2f594cf

Added to database: 11/6/2025, 4:08:41 PM

Last enriched: 1/20/2026, 9:46:23 PM

Last updated: 2/7/2026, 6:18:17 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats