Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68552: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WebCodingPlace WooCommerce Coming Soon Product with Countdown

0
High
VulnerabilityCVE-2025-68552cvecve-2025-68552
Published: Fri Feb 20 2026 (02/20/2026, 15:46:40 UTC)
Source: CVE Database V5
Vendor/Project: WebCodingPlace
Product: WooCommerce Coming Soon Product with Countdown

Description

CVE-2025-68552 is a PHP Remote File Inclusion (RFI) vulnerability affecting the WebCodingPlace WooCommerce Coming Soon Product with Countdown plugin, versions up to 5. 0. The flaw arises from improper control of filenames used in include/require statements, allowing attackers to potentially include malicious files. This vulnerability can lead to remote code execution if exploited, compromising the confidentiality, integrity, and availability of affected systems. No public exploits are currently known, but the risk remains significant due to the nature of RFI vulnerabilities. Organizations using this plugin in their WooCommerce environments should prioritize patching or mitigation. The threat primarily targets websites running the vulnerable plugin, which are likely to be e-commerce sites globally, with higher risk in countries with widespread WooCommerce adoption. Immediate mitigation steps include restricting file inclusion paths, disabling remote URL includes in PHP, and monitoring for suspicious activity. Given the potential for full system compromise and ease of exploitation without authentication, this vulnerability is assessed as high severity.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:24:32 UTC

Technical Analysis

CVE-2025-68552 is a vulnerability classified as Improper Control of Filename for Include/Require Statement in PHP programs, specifically within the WebCodingPlace WooCommerce Coming Soon Product with Countdown plugin (versions up to 5.0). This vulnerability enables PHP Remote File Inclusion (RFI), where an attacker can manipulate the filename parameter used in PHP's include or require statements to load arbitrary files. Although the description mentions PHP Local File Inclusion, the core issue is the lack of proper validation or sanitization of the input controlling the file path, which can be exploited to include remote malicious PHP scripts if remote URL includes are enabled in the PHP configuration. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the server, steal sensitive data, modify website content, or pivot to other parts of the network. The vulnerability affects websites running WooCommerce with this specific plugin installed, which is used to display a 'Coming Soon' product countdown feature. The absence of a CVSS score and public exploits suggests this is a recently disclosed issue, but the technical nature of RFI vulnerabilities is well understood and typically considered critical or high risk. The vulnerability was reserved in December 2025 and published in February 2026, indicating a recent discovery. No official patches or updates are linked yet, so mitigation relies on configuration changes and monitoring. The vulnerability is particularly dangerous because it does not require authentication or user interaction, making automated exploitation feasible if the site is accessible. The plugin's user base is primarily e-commerce websites using WooCommerce, which is widely adopted globally, increasing the potential attack surface. The vulnerability highlights the importance of secure coding practices around file inclusion and input validation in PHP applications.

Potential Impact

The impact of CVE-2025-68552 is significant for organizations running WooCommerce e-commerce sites with the vulnerable plugin installed. Exploitation can lead to remote code execution, allowing attackers to fully compromise the web server hosting the site. This can result in theft of customer data, including payment information, defacement of websites, installation of backdoors, and use of compromised servers as a pivot point for further attacks within the organization's network. The integrity and availability of the e-commerce platform can be severely disrupted, causing financial loss and reputational damage. Since WooCommerce powers a large number of online stores worldwide, the scope of affected systems is broad. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation once the vulnerability becomes publicly known. Organizations that do not promptly address this vulnerability risk data breaches, regulatory penalties, and loss of customer trust. Additionally, attackers may use compromised sites to distribute malware or conduct phishing campaigns, amplifying the threat beyond the initial target.

Mitigation Recommendations

To mitigate CVE-2025-68552, organizations should first check for and apply any official patches or updates released by WebCodingPlace for the WooCommerce Coming Soon Product with Countdown plugin. In the absence of patches, immediate steps include disabling PHP's allow_url_include directive to prevent remote file inclusion, which can be done by setting 'allow_url_include=Off' in the php.ini configuration. Additionally, restrict the include_path to trusted directories only and implement strict input validation and sanitization on any parameters controlling file inclusion. Web application firewalls (WAFs) should be configured to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities. Monitoring web server logs for unusual include/require patterns or unexpected file access can help detect attempted exploitation. If feasible, temporarily disabling or removing the vulnerable plugin until a patch is available reduces risk. Organizations should also conduct security audits of their PHP applications to identify similar unsafe file inclusion practices. Finally, educating developers on secure coding practices and enforcing least privilege principles on web server file permissions can limit the damage from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-19T10:17:17.172Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9f0be58cf853bab85c3

Added to database: 2/20/2026, 8:54:08 PM

Last enriched: 2/20/2026, 9:24:32 PM

Last updated: 2/21/2026, 6:26:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats