CVE-2025-1514

7.3 HIGH

📋 TL;DR

This vulnerability in the Active Products Tables for WooCommerce WordPress plugin allows unauthenticated attackers to call arbitrary WordPress filters with a single parameter due to insufficient restrictions in the get_smth() function. This affects all WordPress sites using this plugin up to version 1.0.6.7, potentially enabling various malicious actions depending on available filters.

💻 Affected Systems

Products:
  • Active Products Tables for WooCommerce WordPress plugin
Versions: All versions up to and including 1.0.6.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin active. WooCommerce must be installed but vulnerability is in the plugin itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary code, modify site content, or escalate privileges by calling dangerous WordPress filters that accept parameters, potentially leading to complete site compromise.

🟠

Likely Case

Attackers could modify site behavior, inject malicious content, or disrupt functionality by calling legitimate filters with unexpected parameters, causing data manipulation or denial of service.

🟢

If Mitigated

With proper security controls and monitoring, impact could be limited to minor site disruptions or unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation but requires knowledge of available WordPress filters and their parameters to achieve specific malicious effects.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0.6.7

Vendor Advisory: https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1753

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Active Products Tables for WooCommerce'. 4. Click 'Update Now' if available, or delete and reinstall latest version. 5. Verify plugin version is greater than 1.0.6.7.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily deactivate the plugin until patched version is available

wp plugin deactivate profit-products-tables-for-woocommerce

🧯 If You Can't Patch

  • Disable the plugin completely until patched version is available
  • Implement web application firewall rules to block requests targeting the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Active Products Tables for WooCommerce' version 1.0.6.7 or lower

Check Version:

wp plugin get profit-products-tables-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.0.6.7 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php or admin-post.php with 'action' parameter containing filter names
  • Multiple failed filter calls from single IP addresses
  • Unexpected filter execution in WordPress debug logs

Network Indicators:

  • HTTP requests containing 'get_smth' parameter or unusual filter names in query strings
  • Traffic patterns showing repeated filter calls from external sources

SIEM Query:

source="wordpress.log" AND ("get_smth" OR "admin-ajax.php" AND "action=*")

🔗 References

📤 Share & Export