## https://sploitus.com/exploit?id=A75F7663-6D70-5D4C-83D7-0FB7D242274C
# CVE-2025-47577 - WordPress TI WooCommerce Wishlist <= 2.9.2 - Arbitrary File Upload
## ๐ฅ Vulnerability Summary
The WordPress plugin **TI WooCommerce Wishlist** version **<= 2.9.2** is vulnerable to an **unauthenticated arbitrary file upload** vulnerability. This allows attackers to upload any file type, including executable PHP files, potentially leading to **Remote Code Execution (RCE)**.
This vulnerability arises due to the lack of proper MIME-type and content validation on the upload endpoint `/`, allowing attackers to upload a file through a specially crafted `multipart/form-data` POST request.
## ๐ Affected Plugin
- **Plugin Name:** TI WooCommerce Wishlist
- **Affected Version:** <= 2.9.2
- **Vulnerability Type:** Unauthenticated Arbitrary File Upload
- **CVE ID:** CVE-2025-47577
- **CVSS Score:** 9.8 (Critical)
- **Impact:** Remote Code Execution (RCE)
## ๐งช Exploit Features
- ๐ Automatically grabs `product_id` from homepage (`data-tinv-wl-product`)
- ๐ผ Uploads arbitrary file (e.g., image or PHP) using the wishlist endpoint
- ๐ Extracts wishlist share key from JSON response
- ๐ Checks `/wishlist/<key>` for uploaded image path
- ๐พ Saves valid uploaded image URLs to `result.txt`
- ๐พ Saves valid wishlist URLs to `result_wishlist.txt`
## ๐ง Researcher
Credit: [Patchstack Database](https://patchstack.com/database/wordpress/plugin/ti-woocommerce-wishlist/vulnerability/wordpress-ti-woocommerce-wishlist-2-9-2-arbitrary-file-upload-vulnerability)
## ๐ Usage
1. Prepare your `list.txt` file with a list of target domains (one per line, without `http`).
2. Place the file you want to upload (e.g. `hinata.jpg`) in the same folder.
3. Run the script:
```bash
python3 CVE-2025-47577.py
```
### Example `list.txt`:
```
example.com
targetshop.org
store123.net
```
## ๐ Output
- `result.txt`: List of successful uploaded image URLs
- `result_wishlist.txt`: List of valid wishlist pages
---
๐ **Disclaimer**: This script is for educational and authorized testing purposes only.