Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60207: Unrestricted Upload of File with Dangerous Type in Addify Custom User Registration Fields for WooCommerce

0
Critical
VulnerabilityCVE-2025-60207cvecve-2025-60207
Published: Thu Nov 06 2025 (11/06/2025, 15:55:06 UTC)
Source: CVE Database V5
Vendor/Project: Addify
Product: Custom User Registration Fields for WooCommerce

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Addify Custom User Registration Fields for WooCommerce user-registration-plugin-for-woocommerce allows Upload a Web Shell to a Web Server.This issue affects Custom User Registration Fields for WooCommerce: from n/a through <= 2.1.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:49:54 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60207 affects the Addify Custom User Registration Fields plugin for WooCommerce, versions up to and including 2.1.2. This plugin allows users to add custom fields during user registration on WooCommerce-powered websites. The flaw permits unrestricted upload of files with dangerous types, including executable web shells, without any authentication or user interaction required. This means an unauthenticated attacker can upload malicious files directly to the web server, leading to remote code execution (RCE). The vulnerability arises from insufficient validation and filtering of uploaded files, allowing attackers to bypass restrictions and place arbitrary files on the server. The CVSS score of 10.0 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change that impacts confidentiality, integrity, and availability at a high level. Exploitation could lead to full system compromise, data theft, defacement, or service disruption. Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. The plugin is widely used in WooCommerce environments, which power many e-commerce sites globally, increasing the potential attack surface.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Addify plugin, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized access to sensitive customer data, including personal and payment information, resulting in data breaches and regulatory non-compliance under GDPR. The integrity of the website and backend systems can be compromised, enabling attackers to alter product listings, prices, or inject malicious content that harms brand reputation. Availability may also be affected if attackers deploy ransomware or disrupt services, leading to financial losses and customer trust erosion. The critical nature of the vulnerability means that attackers can operate remotely without authentication, increasing the likelihood of widespread exploitation. Organizations in Europe face potential legal and financial consequences due to data protection laws and the high value of e-commerce infrastructure as a target for cybercriminals.

Mitigation Recommendations

Immediate mitigation steps include disabling the Addify Custom User Registration Fields plugin until a security patch is released. Organizations should monitor vendor communications for updates and apply patches promptly once available. In the interim, implement strict file upload restrictions by configuring web application firewalls (WAFs) to block uploads of executable or script file types such as .php, .jsp, .asp, and others. Employ server-side validation and sanitization of uploaded files to ensure only safe file types are accepted. Restrict upload directories from executing scripts by configuring appropriate permissions and disabling execution rights. Conduct regular security audits and monitor logs for unusual upload activity or web shell indicators. Additionally, implement network segmentation to limit the impact of potential compromises and maintain up-to-date backups to enable recovery in case of an incident. Educate development and security teams about secure coding practices related to file uploads to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:42.280Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc80cca26fb4dd2f595d6

Added to database: 11/6/2025, 4:08:44 PM

Last enriched: 1/20/2026, 9:49:54 PM

Last updated: 2/6/2026, 12:27:55 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats