CVE-2025-49887
WPFactory · WPFactory Product XML Feed Manager for WooCommerce
A critical vulnerability has been identified in the WPFactory Product XML Feed Manager for WooCommerce plugin.
Executive summary
A critical vulnerability has been identified in the WPFactory Product XML Feed Manager for WooCommerce plugin. This flaw allows an unauthenticated remote attacker to inject and execute arbitrary code on the web server, which could lead to a complete system compromise, data theft, and service disruption. Due to the extreme severity and potential for straightforward exploitation, immediate patching is required.
Vulnerability
The vulnerability is an Improper Control of Generation of Code, commonly known as Code Injection. Specifically, it allows for Remote Code Inclusion, where an attacker can trick the application into including and executing a file from a remote, attacker-controlled server. An unauthenticated attacker can craft a malicious HTTP request containing a URL pointing to their malicious code. The vulnerable plugin fails to properly sanitize this input, causing the server to fetch and execute the remote file, granting the attacker full control over the website in the context of the web server's user account.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.9, reflecting the highest possible level of risk. Successful exploitation would grant an attacker complete control over the affected web server. Potential consequences include the theft of sensitive data such as customer information and payment details, website defacement, deployment of ransomware, or using the compromised server to launch further attacks. The business could face significant financial losses, severe reputational damage, and potential legal and regulatory penalties for data breaches.
Remediation
Immediate Action: Update the WPFactory Product XML Feed Manager for WooCommerce plugin to the latest patched version immediately. After patching, it is crucial to monitor for any signs of post-patch exploitation attempts and thoroughly review historical access logs for indicators of a prior compromise.
Proactive Monitoring: Implement enhanced monitoring of web server access logs, looking for unusual requests containing URLs, IP addresses, or suspicious code snippets in request parameters. Monitor for unexpected outbound network connections from the web server, which could indicate a successful Remote Code Inclusion attack. Utilize file integrity monitoring to detect the creation of unauthorized files or backdoors on the server.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with strict rules designed to block Remote Code Inclusion and Code Injection attack patterns. Restrict the web server's outbound network connectivity to only essential, trusted destinations to prevent it from fetching malicious remote files. Ensure web server file permissions are hardened to limit the impact of potential code execution.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.9, organizations are strongly advised to treat this vulnerability with the highest priority and apply the security update provided by the vendor immediately. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity and the ease of potential exploitation make it a prime candidate for future inclusion should widespread attacks occur. A patch-and-monitor strategy is the most effective way to mitigate the significant risk posed by this vulnerability.