CVE-2025-60207
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files, including web shells, to WooCommerce websites using the affected plugin. Attackers can gain full control of the web server by uploading malicious PHP files. All WordPress sites with the vulnerable plugin versions are affected.
💻 Affected Systems
- Custom User Registration Fields for WooCommerce
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, website defacement, and use as attack platform
Likely Case
Web shell upload leading to backdoor access, data exfiltration, and lateral movement within the hosting environment
If Mitigated
File upload attempts blocked or logged, with minimal impact due to proper file type validation and server hardening
🎯 Exploit Status
Exploitation requires user registration functionality to be enabled
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.3 or later
Restart Required: No
Instructions:
1. Update plugin to version 2.1.3 or later via WordPress admin panel. 2. Verify update completed successfully. 3. Test user registration functionality.
🔧 Temporary Workarounds
Disable file uploads
allTemporarily disable file upload functionality in user registration
Web server file type restrictions
linuxConfigure web server to block execution of uploaded files in upload directories
For Apache: Add 'php_flag engine off' to .htaccess in upload directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to upload directory config
🧯 If You Can't Patch
- Disable the plugin completely until patched
- Implement WAF rules to block suspicious file upload patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for plugin version. If version is 2.1.2 or earlier, system is vulnerable.
Check Version:
wp plugin list --name='Custom User Registration Fields for WooCommerce' --field=version
Verify Fix Applied:
Verify plugin version shows 2.1.3 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to wp-content/uploads directory
- POST requests with file uploads to user registration endpoints
- Execution of PHP files from upload directories
Network Indicators:
- HTTP POST requests with file uploads to /wp-admin/admin-ajax.php or similar endpoints
- Unusual outbound connections from web server after file upload
SIEM Query:
source="web_server" (method="POST" AND uri_path="*admin-ajax.php*" AND form_data="*php*" AND form_data="*upload*")