CVE-2025-13088
WordPress · WordPress "Category and Product Woocommerce Tabs" plugin
A high-severity vulnerability has been identified in the "Category and Product Woocommerce Tabs" plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the "Category and Product Woocommerce Tabs" plugin for WordPress. This flaw, known as Local File Inclusion, allows an unauthenticated attacker to access and read sensitive files on the web server, such as configuration files containing database credentials. Successful exploitation could lead to a full system compromise, data breach, and significant disruption to business operations.
Vulnerability
The plugin is vulnerable to Local File Inclusion (LFI). This is due to insufficient validation of user-supplied input, which is then used in a file path. An unauthenticated remote attacker can exploit this by crafting a malicious request that includes directory traversal sequences (e.g., ../) to navigate the server's file system and include arbitrary files. This could allow the attacker to view the contents of sensitive files such as wp-config.php, /etc/passwd, and other system or application configuration files.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation can have severe consequences for the business, starting with the disclosure of highly sensitive information. An attacker could obtain database credentials, API keys, and internal server path information, which can be leveraged to escalate privileges and achieve a complete server takeover. The specific risks include data breaches of customer or company information, financial loss, reputational damage, and the potential use of the compromised server to launch further attacks.
Remediation
Immediate Action:
- Immediately update the "Category and Product Woocommerce Tabs" plugin to the latest patched version provided by the vendor.
- If the plugin is not essential for business operations or if a patch is not yet available, the plugin should be disabled and removed to eliminate the attack surface.
- Review WordPress security settings and file permissions to ensure they follow the principle of least privilege, limiting the web server's read access to non-essential files.
Proactive Monitoring:
- Review web server access logs (e.g., Apache, Nginx) for requests containing directory traversal patterns like
../,..%2f, or absolute file paths targeting sensitive files (e.g.,wp-config.php,/etc/passwd). - Implement a File Integrity Monitoring (FIM) solution to alert on any unauthorized access or changes to critical system and application files.
- Monitor for unusual outbound network traffic, which could indicate that an attacker has escalated the LFI vulnerability to achieve remote code execution.
Compensating Controls:
- Deploy a Web Application Firewall (WAF) with a robust ruleset configured to block directory traversal and LFI attack patterns.
- Harden the underlying server operating system and PHP configuration. Restrict the web server user's file system permissions to only the necessary directories.
- Disable potentially dangerous PHP functions (e.g.,
include,require,file_get_contents) if they can be abused and are not critical for application functionality, though this should be tested thoroughly.
Exploitation status
Public Exploit Available: true
Analyst recommendation
This vulnerability poses a significant and immediate risk to the organization. Due to the high CVSS score, the public availability of an exploit, and the simplicity of exploitation, this issue must be addressed with the highest priority. All systems running the affected plugin should be patched or have the plugin removed immediately. Furthermore, it is recommended to review logs for any signs of past exploitation and initiate incident response procedures if a compromise is suspected.