Executive Summary
Cybersecurity researchers have disclosed a critical unpatched security flaw impacting the TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files.
TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists on social media platforms.
Technical Analysis
"The plugin is vulnerable to an arbitrary file upload vulnerability which allows attackers to upload malicious files to the server without authentication," Patchstack researcher John Castro said.
Tracked as CVE-2025-47577, the vulnerability carries a CVSS score of 10.0. It affects all versions of the plugin below and including 2.9.2 released on November 29, 2024. There is currently no patch available.
Root Cause Analysis
The website security company said the issue lies in a function named
"tinvwl_upload_file_wc_fields_factory,"
which, in turn, uses another native WordPress function
"wp_handle_upload"
to perform the validation, but sets the override parameters
"test_form"
and
"test_type"
to
"false"
.
test_type Parameter
Used to check whether the Multipurpose Internet Mail Extension (MIME) type of the file is as expected
test_form Parameter
Used to verify if the $_POST['action'] parameter is as expected
Critical Flaw
In setting
"test_type"
to false, it allows the file type validation to be effectively
bypassed, thereby allowing
any file type to be uploaded.
Attack Prerequisites & Scenario
Required Conditions for Exploitation
The vulnerable function is accessible via
tinvwl_meta_wc_fields_factory
or
tinvwl_cart_meta_wc_fields_factory
, which are only available when the
WC Fields Factory plugin is active.
Hypothetical Attack Scenario
In a hypothetical attack scenario, a threat actor could upload a malicious PHP file and achieve remote code execution (RCE) by directly accessing the uploaded file. This would give attackers complete control over the affected WordPress site.
Immediate Actions Required
For Site Owners
For Developers
'test_type' => false
when using
wp_handle_upload()
Protect Your WooCommerce Store Today
Don't wait for the next vulnerability to impact your business. Get a comprehensive security assessment now.