Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60248: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WPClever WPC Product Options for WooCommerce

0
High
VulnerabilityCVE-2025-60248cvecve-2025-60248
Published: Thu Nov 06 2025 (11/06/2025, 15:55:21 UTC)
Source: CVE Database V5
Vendor/Project: WPClever
Product: WPC Product Options for WooCommerce

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WPClever WPC Product Options for WooCommerce wpc-product-options allows PHP Local File Inclusion.This issue affects WPC Product Options for WooCommerce: from n/a through <= 1.8.6.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:31:54 UTC

Technical Analysis

CVE-2025-60248 is a vulnerability classified as 'Improper Control of Filename for Include/Require Statement in PHP Program,' commonly known as a Remote File Inclusion (RFI) or Local File Inclusion (LFI) vulnerability. It affects the WPClever WPC Product Options for WooCommerce plugin, versions up to 1.8.6. The vulnerability arises because the plugin fails to properly validate or sanitize user-supplied input used in PHP include or require statements. This flaw allows an attacker with low privileges to manipulate the filename parameter to include arbitrary files from local or remote sources. The vulnerability is remotely exploitable over the network without requiring user interaction, but it requires low-level privileges, such as a subscriber or contributor role on the WordPress site. Exploiting this vulnerability can lead to severe consequences, including remote code execution, data disclosure, and full system compromise, impacting confidentiality, integrity, and availability. The CVSS v3.1 score of 7.5 indicates a high severity, with attack vector network (AV:N), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known yet, but the vulnerability's nature makes it a critical risk for WooCommerce sites using this plugin. The vulnerability was published on November 6, 2025, and was reserved on September 25, 2025. No official patch links are currently available, so organizations must monitor vendor updates closely. The vulnerability is particularly relevant for e-commerce websites running WooCommerce with this plugin, as attackers could leverage it to execute arbitrary PHP code, steal sensitive customer data, or disrupt online store operations.

Potential Impact

The impact of CVE-2025-60248 on European organizations is significant, especially for those operating e-commerce platforms using WooCommerce with the vulnerable WPC Product Options plugin. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the affected web server. This can result in theft of sensitive customer data, including payment information and personal details, leading to privacy violations and regulatory non-compliance under GDPR. Additionally, attackers could deface websites, disrupt business operations, or use compromised servers as a foothold for further attacks within the corporate network. The high severity and remote exploitability mean that even low-privileged users or automated bots could attempt exploitation, increasing the risk of widespread attacks. The lack of user interaction requirement facilitates automated exploitation attempts. For European organizations, this could translate into financial losses, reputational damage, and legal penalties. The vulnerability also poses risks to supply chain security if exploited to distribute malware or ransomware through compromised e-commerce sites.

Mitigation Recommendations

1. Immediate action should be to monitor WPClever's official channels for a security patch addressing CVE-2025-60248 and apply it as soon as it becomes available. 2. Until a patch is released, restrict access to the vulnerable plugin's functionality by limiting user roles and permissions, especially for low-privilege users. 3. Implement strict input validation and sanitization on any parameters that influence file inclusion paths, either via custom code or web application firewall (WAF) rules. 4. Deploy a WAF with rules specifically designed to detect and block attempts to exploit file inclusion vulnerabilities, such as suspicious URL patterns or payloads attempting to include remote or local files. 5. Regularly audit and monitor web server and application logs for unusual requests or errors related to file inclusion attempts. 6. Consider isolating the WooCommerce environment using containerization or sandboxing to limit the blast radius in case of compromise. 7. Educate development and security teams about secure coding practices related to file inclusion and PHP application security. 8. Backup website data and configurations regularly to enable rapid recovery in case of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:34:44.964Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc810ca26fb4dd2f5969a

Added to database: 11/6/2025, 4:08:48 PM

Last enriched: 11/13/2025, 5:31:54 PM

Last updated: 11/22/2025, 5:58:48 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats