The Category and Product Woocommerce Tabs plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1
Description
The Category and Product Woocommerce Tabs plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1
AI Analyst Comment
Remediation
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Executive Summary:
A high-severity vulnerability has been identified in the "Category and Product Woocommerce Tabs" plugin for WordPress. This flaw, known as Local File Inclusion, allows an unauthenticated attacker to access and read sensitive files on the web server, such as configuration files containing database credentials. Successful exploitation could lead to a full system compromise, data breach, and significant disruption to business operations.
Vulnerability Details
CVE-ID: CVE-2025-13088
Affected Software: WordPress "Category and Product Woocommerce Tabs" plugin
Affected Versions: All versions up to, and including, 1.
Vulnerability: The plugin is vulnerable to Local File Inclusion (LFI). This is due to insufficient validation of user-supplied input, which is then used in a file path. An unauthenticated remote attacker can exploit this by crafting a malicious request that includes directory traversal sequences (e.g.,
../) to navigate the server's file system and include arbitrary files. This could allow the attacker to view the contents of sensitive files such aswp-config.php,/etc/passwd, and other system or application configuration files.Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation can have severe consequences for the business, starting with the disclosure of highly sensitive information. An attacker could obtain database credentials, API keys, and internal server path information, which can be leveraged to escalate privileges and achieve a complete server takeover. The specific risks include data breaches of customer or company information, financial loss, reputational damage, and the potential use of the compromised server to launch further attacks.
Remediation Plan
Immediate Action:
Proactive Monitoring:
../,..%2f, or absolute file paths targeting sensitive files (e.g.,wp-config.php,/etc/passwd).Compensating Controls:
include,require,file_get_contents) if they can be abused and are not critical for application functionality, though this should be tested thoroughly.Exploitation Status
Public Exploit Available: true
Analyst Notes:
As of November 18, 2025, proof-of-concept (PoC) exploits for this vulnerability are publicly available. LFI vulnerabilities in WordPress plugins are trivial to exploit and are frequently targeted by automated scanning tools shortly after disclosure. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and the availability of public exploits make it a prime target for opportunistic attackers.
Analyst Recommendation
This vulnerability poses a significant and immediate risk to the organization. Due to the high CVSS score, the public availability of an exploit, and the simplicity of exploitation, this issue must be addressed with the highest priority. All systems running the affected plugin should be patched or have the plugin removed immediately. Furthermore, it is recommended to review logs for any signs of past exploitation and initiate incident response procedures if a compromise is suspected.