CVE-2025-11722
WordPress · WordPress Woocommerce Category and Products Accordion Panel plugin
A high-severity vulnerability has been identified in the "Woocommerce Category and Products Accordion Panel" plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the "Woocommerce Category and Products Accordion Panel" plugin for WordPress. This flaw, known as Local File Inclusion, could allow an unauthenticated attacker to access and read sensitive files directly from the web server, potentially exposing confidential data like database credentials and system configuration files, leading to further system compromise.
Vulnerability
The plugin is vulnerable to Local File Inclusion (LFI). An attacker can exploit this by manipulating an input parameter within the application to include and execute or display the contents of files on the server's local file system. This is typically achieved by using directory traversal sequences (e.g., ../) in a URL parameter to navigate the server's directory structure and specify a target file, such as wp-config.php or /etc/passwd, for the server to read and return to the attacker.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to significant business impact, including the unauthorized disclosure of sensitive information such as database credentials, API keys, and internal system configurations. This exposure could facilitate further attacks, result in a complete system compromise, lead to a data breach of customer information, cause reputational damage, and incur financial costs associated with incident response and regulatory fines.
Remediation
Immediate Action: Immediately update the "Woocommerce Category and Products Accordion Panel" plugin to the latest patched version provided by the vendor. If the plugin is no longer necessary for business operations, it should be deactivated and completely removed from the WordPress installation to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for suspicious requests containing directory traversal patterns (e.g., ../, ..%2F) or attempts to access common sensitive files. Implement a Web Application Firewall (WAF) to detect and block known LFI attack signatures. Monitor for any unusual file access or modifications on the web server.
Compensating Controls: If patching cannot be performed immediately, deploy a WAF with strict rules to filter for and block LFI and directory traversal attempts. Additionally, enforce strict file system permissions to ensure the web server's user account has read access only to the necessary directories, limiting the impact of a potential breach.
Exploitation status
Public Exploit Available: true
Analyst recommendation
Due to the High severity (CVSS 7.5) of this vulnerability, immediate action is strongly recommended. Organizations must prioritize identifying all WordPress sites using the affected "Woocommerce Category and Products Accordion Panel" plugin and apply the vendor-supplied patch without delay. If the plugin is not critical, the most secure course of action is its complete removal to mitigate this risk entirely.