Share
## https://sploitus.com/exploit?id=68A308DB-190C-5363-AFB4-505B2EF20EB9
# CVE-2025-47577

A proof of concept developed to exploit [CVE-2025-47577](https://nvd.nist.gov/vuln/detail/CVE-2025-47577). Based on PatchStack's [article](https://patchstack.com/articles/unpatched-critical-vulnerability-in-ti-woocommerce-wishlist-plugin/).

# Usage

```
usage: python CVE-2025-47577.py --help

TI WooCommerce Wishlist (WordPress plugin) <= 2.9.2 CVE-2025-47577 PoC

positional arguments:
  FILE           local file to upload
  URL_PATH       base path of the wish list
  PRODUCT_ID     ID of the product to add

optional arguments:
  -h, --help     show this help message and exit
  --https        use HTTPS?
  --RHOST RHOST  remote host
  --RPORT RPORT  remote port
  -v, --version  show program's version number and exit
```

# Affected Versions

All versions of TI WooCommerce Wishlist (WordPress plugin) <= 2.9.2

# Patch Guidance

Upgrade to the latest version available.

# Authors

Made by [@sug4r-wr41th](https://github.com/sug4r-wr41th)

# Disclaimer

Fair Use disclaimer: for educational purposes only.