CVE-2025-6746
WordPress · WordPress WoodMart plugin
A high-severity vulnerability has been identified in the WordPress WoodMart plugin, which could allow an unauthenticated attacker to access sensitive files on the web server.
Executive summary
A high-severity vulnerability has been identified in the WordPress WoodMart plugin, which could allow an unauthenticated attacker to access sensitive files on the web server. Successful exploitation could lead to the exposure of confidential information, such as website configuration details and user credentials, posing a significant risk to the organization's data security and operational integrity.
Vulnerability
The vulnerability is a Local File Inclusion (LFI) flaw within the WoodMart plugin. This occurs because a component of the plugin fails to properly sanitize user-supplied input that is used in a file path. An unauthenticated attacker can manipulate this input, typically through a crafted URL parameter, to include directory traversal sequences (../../). This allows the attacker to navigate outside of the intended directory and read the contents of arbitrary files on the server, limited only by the file system permissions of the web server's user account. For example, an attacker could potentially access wp-config.php to steal database credentials or /etc/passwd to enumerate system users.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8, reflecting the significant risk it poses to the business. Exploitation can lead to a direct data breach by exposing sensitive configuration files, database credentials, API keys, and other proprietary information stored on the server. This information can be leveraged by attackers to conduct further, more damaging attacks, potentially leading to a full system compromise. The business consequences include reputational damage, loss of customer trust, non-compliance with data protection regulations (e.g., GDPR, CCPA), and financial costs associated with incident response and recovery.
Remediation
Immediate Action: The primary remediation is to immediately update the WoodMart plugin to the latest patched version as recommended by the vendor. This update should be applied across all development, staging, and production environments after appropriate testing to ensure compatibility and functionality.
Proactive Monitoring: Organizations should actively monitor web server access logs (e.g., Apache, Nginx) for suspicious requests containing directory traversal patterns (../, %2e%2e%2f, etc.) or attempts to access sensitive system files like wp-config.php or /etc/passwd. Implementing a File Integrity Monitoring (FIM) solution can also help detect unauthorized access or changes to critical files.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
- Web Application Firewall (WAF): Deploy and configure a WAF with rulesets designed to detect and block LFI and directory traversal attack patterns.
- Harden Server Permissions: Ensure the web server process runs with the principle of least privilege and is restricted from reading files outside of the web root directory wherever possible.
- Disable Plugin: If the plugin is not critical to business operations, consider temporarily disabling it until a patch can be safely applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the critical nature of the data at risk, immediate action is strongly recommended. Organizations using the WoodMart plugin should treat this as a high-priority vulnerability and apply the vendor-supplied patch without delay, rather than waiting for a standard patch cycle. Although there is no evidence of active exploitation in the wild yet, the simplicity of exploiting LFI vulnerabilities makes it a prime target for opportunistic attackers. We advise all affected organizations to patch immediately and review logs for any signs of past compromise attempts.