CVE-2025-22782

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to WordPress servers running the WR Price List Manager for WooCommerce plugin. Attackers can upload web shells to gain remote code execution capabilities. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • WR Price List Manager for WooCommerce WordPress Plugin
Versions: All versions up to and including 1.0.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to execute arbitrary code, steal data, install malware, and pivot to other systems.

🟠

Likely Case

Attackers upload web shells to gain persistent access, deface websites, steal sensitive data, and use the server for malicious activities.

🟢

If Mitigated

If file upload restrictions are properly implemented, attackers cannot upload dangerous file types, preventing code execution.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal WordPress installations could still be targeted by internal threats or compromised accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the ability to upload files to the vulnerable endpoint. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.9 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wr-price-list-for-woocommerce/vulnerability/wordpress-wr-price-list-manager-for-woocommerce-plugin-1-0-8-remote-code-execution-rce-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find WR Price List Manager for WooCommerce. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate wr-price-list-for-woocommerce

Restrict File Uploads

all

Configure web server to block uploads of executable file types to plugin directories

# Add to .htaccess for Apache:
<FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|php-s|pht|phar|inc)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>
# Add to nginx config:
location ~* \.(php|phtml|php3|php4|php5|php7|phps|php-s|pht|phar|inc)$ {
  deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate and remove the plugin from all WordPress installations
  • Implement web application firewall (WAF) rules to block file uploads to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > WR Price List Manager for WooCommerce version. If version is 1.0.8 or lower, you are vulnerable.

Check Version:

wp plugin get wr-price-list-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 1.0.9 or higher in WordPress admin panel. Test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to plugin directories
  • POST requests to price list upload endpoints with PHP files
  • Web server errors related to file type restrictions

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/wr-price-list-for-woocommerce/ upload endpoints
  • Traffic to unexpected PHP files in plugin directories

SIEM Query:

source="web_server" AND (url="*wr-price-list-for-woocommerce*" AND method="POST" AND (file_extension="php" OR file_extension="phtml" OR file_extension="phar"))

🔗 References

📤 Share & Export