Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How AI Supercharges Transformational Change for ALS Imagination

When microgrids begin to talk to each other

Google launches DBSC Open Beta in Chrome and increases patch transparency via Project Zero

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Over 100,000 WordPress sites at risk from critical CVSS 10.0 vulnerabilities in Wishlist plugins
Identity

Over 100,000 WordPress sites at risk from critical CVSS 10.0 vulnerabilities in Wishlist plugins

userBy userMay 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 29, 2025Ravi LakshmananVulnerability/Website Security

WordPress Vulnerability

Cybersecurity researchers have disclosed important hidden security flaws affecting WordPress Ti Woocommerce Wishlist plugins that can be exploited by unrecognized attackers to upload any file.

With over 100,000 active installations, Ti WooCommerce Wishlist is a tool that enables e-commerce website customers to save their favorite products later and share their lists on social media platforms.

“The plug-ins are vulnerable to any file upload vulnerability that allows an attacker to upload malicious files to a server without authentication,” said John Castro, a researcher at PatchStack.

Tracked as CVE-2025-47577, the vulnerability has a CVSS score of 10.0. This affects all versions of the following plugins, including 2.9.2, released on November 29, 2024: There are no patches at the moment.

The website security company said the issue lies in a function named “Tinvwl_upload_file_wc_fields_factory”.

Cybersecurity

Use the “test_type” override to check if the file’s Multipurpose Internet Mail Extension (MIME) type is as expected, but “test_form” is checked for $_post to check.[‘action’] The parameters are as expected.

Setting “test_type” to false will effectively bypass file type verification and allow you to upload file types.

That being said, vulnerable functions can be accessed via tinvwl_meta_wc_fields_factory or tinvwl_cart_meta_wc_fields_factory.

This also means that successful exploitation is possible only if the WC Fields Factory plugin is installed and activated on your WordPress site and integration is enabled on the Ti WooCommerce Wishlist plugin.

In a hypothetical attack scenario, a threat actor can upload a malicious PHP file and directly access the uploaded file to achieve Remote Code Execution (RCE).

Plugin developers recommend that you remove or avoid the ‘test_type’ => false setting when using wp_handle_upload(). If there is no patch, plugin users will be prompted from the site to disable and remove the plugin.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe start of Harvard, held when Trump opposes anti-Semitism
Next Article Oil and gas have boomed in New Mexico. Its schools are contending with pollution’s effects
user
  • Website

Related Posts

Google launches DBSC Open Beta in Chrome and increases patch transparency via Project Zero

July 30, 2025

Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems

July 30, 2025

Scattered spider hackers arrest arrest a halt attack, but copying threats maintain security pressure

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How AI Supercharges Transformational Change for ALS Imagination

When microgrids begin to talk to each other

Google launches DBSC Open Beta in Chrome and increases patch transparency via Project Zero

Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.