As per sources, a critical security vulnerability has been discovered in the TI WooCommerce Wishlist plugin, a popular WordPress extension active on over 100,000 websites. Tracked as CVE-2025-47577, this unauthenticated arbitrary file upload flaw affects version 2.9.2 and all earlier releases. With no patch currently available, site owners are strongly advised to deactivate and remove the plugin immediately to protect against potential attacks. The vulnerability resides in the plugin’s tinvwl_upload_file_wc_fields_factory function within the integrations/wc-fields-factory.php file. This function misuses WordPress’s wp_handle_upload by disabling file type validation ('test_type' => false), effectively allowing attackers to upload any file type—including PHP scripts. These can be executed remotely, enabling full server compromise, data theft, or operational disruption. Although the exploit requires the WC Fields Factory plugin to be active—limiting the number of vulnerable setups—it still presents a high-severity risk due to its unauthenticated nature. Attackers can execute malicious uploads without credentials, significantly increasing the likelihood of exploitation. The absence of an official fix further elevates the urgency, leaving complete removal as the only effective mitigation strategy. For users of Patchstack’s paid services, temporary protection is available, while the broader WordPress community awaits an official update from the plugin developers. This incident highlights the need for robust security practices in plugin development, especially when bypassing core safeguards. Until a secure update is released, WooCommerce store owners must prioritize security over convenience to avoid serious compromise.
European fitness operator Basic-Fit has confirmed a major data breach impacting approximately one million members across its network, with around 200,000 affected users in the Neth...
A large-scale WordPress security incident has reportedly exposed how a widely used plugin ecosystem can be abused for supply chain attacks. According to the account, more than 30 p...
A recent campaign attributed to APT37 (also known as ScarCruft) highlights a sophisticated use of social engineering to distribute malware. In this operation, attackers initially c...