Over 100,000 WordPress Sites Vulnerable Due to Critical Flaw in Wishlist Plugin
May 29, 2025
Vulnerability / Website Security
A significant cybersecurity threat has emerged involving a critical security vulnerability in the TI WooCommerce Wishlist plugin for WordPress. Currently used by over 100,000 active installations, this plugin allows e-commerce customers to create and share lists of their favorite products on various social media platforms. Researchers have identified an unpatched flaw that could permit unauthenticated attackers to upload arbitrary files to affected servers.
The vulnerability, designated CVE-2025-47577, has been assigned a CVSS score of 10.0, indicating its potential severity. All versions of the plugin, up to and including 2.9.2, which was released on November 29, 2024, are affected. Without an available patch, the risk remains high for businesses relying on this plugin for their e-commerce operations.
According to Patchstack researcher John Castro, the issue arises from a function called “tinvwl_upload_file_wc_fields_factory,” which interacts with native WordPress functionality. This flaw could serve as a gateway for attackers, allowing them to execute malicious activities on the server without authentication.
The primary targets of this vulnerability are e-commerce websites operating in the United States, leveraging the WordPress platform. Given the plugin’s significant usage, the potential for exploitation is notable. An attacker could harness this vulnerability to gain unauthorized access or inject harmful code, thereby compromising the integrity of affected websites.
In context of the MITRE ATT&CK framework, several tactics that could be employed in exploiting this vulnerability include initial access through unauthorized file uploads and persistence by implanting malicious scripts. Furthermore, privilege escalation could occur if attackers gain higher access rights as a result of this exploitation, allowing them to manipulate site functionalities and data extensively.
Business owners utilizing the TI WooCommerce Wishlist plugin should urgently assess their security measures and consider disabling the plugin until a fix is released. Awareness of such vulnerabilities is crucial for maintaining the security of e-commerce operations and protecting sensitive customer information. The ongoing risks associated with unpatched vulnerabilities underscore the importance of timely updates and robust cybersecurity practices in an increasingly digital landscape.