CVE-2025-60207

10.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files, including web shells, to WooCommerce websites using the affected plugin. Attackers can gain full control of the web server by uploading malicious PHP files. All WordPress sites with the vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Custom User Registration Fields for WooCommerce
Versions: All versions up to and including 2.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WooCommerce and WordPress installation

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and use as attack platform

🟠

Likely Case

Web shell upload leading to backdoor access, data exfiltration, and lateral movement within the hosting environment

🟢

If Mitigated

File upload attempts blocked or logged, with minimal impact due to proper file type validation and server hardening

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user registration functionality to be enabled

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.3 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/user-registration-plugin-for-woocommerce/vulnerability/wordpress-custom-user-registration-fields-for-woocommerce-plugin-2-1-2-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update plugin to version 2.1.3 or later via WordPress admin panel. 2. Verify update completed successfully. 3. Test user registration functionality.

🔧 Temporary Workarounds

Disable file uploads

all

Temporarily disable file upload functionality in user registration

Web server file type restrictions

linux

Configure web server to block execution of uploaded files in upload directories

For Apache: Add 'php_flag engine off' to .htaccess in upload directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to upload directory config

🧯 If You Can't Patch

  • Disable the plugin completely until patched
  • Implement WAF rules to block suspicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version. If version is 2.1.2 or earlier, system is vulnerable.

Check Version:

wp plugin list --name='Custom User Registration Fields for WooCommerce' --field=version

Verify Fix Applied:

Verify plugin version shows 2.1.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads directory
  • POST requests with file uploads to user registration endpoints
  • Execution of PHP files from upload directories

Network Indicators:

  • HTTP POST requests with file uploads to /wp-admin/admin-ajax.php or similar endpoints
  • Unusual outbound connections from web server after file upload

SIEM Query:

source="web_server" (method="POST" AND uri_path="*admin-ajax.php*" AND form_data="*php*" AND form_data="*upload*")

🔗 References

📤 Share & Export