WordPress Woopsie: Unpatched Flaw in TI WooCommerce Wishlist Leaves Sites Vulnerable!
Brace yourself, WordPress users! The TI WooCommerce Wishlist plugin has a CVSS score of 10.0 vulnerability, opening the door for unauthenticated attackers to upload arbitrary files. The exploit could lead to remote code execution. Until patched, deactivate the plugin and keep those wishlists on paper—it’s safer!

Hot Take:
It’s like leaving the back door wide open because you forgot to install a doorknob! The TI WooCommerce Wishlist plugin has decided to play the role of an overly generous Santa, leaving the gift of remote code execution under the tree for any cyber Grinch to exploit. If this were a movie, it would be called “How the Grinch Stole Your Data.” Patch that hole, or you might find your site singing a sad tune this holiday season.
Key Points:
- TI WooCommerce Wishlist plugin for WordPress has a critical unpatched security flaw.
- The flaw allows unauthenticated attackers to upload arbitrary files.
- Vulnerability tracked as CVE-2025-47577 with a CVSS score of 10.0.
- Exploitation requires the WC Fields Factory plugin to be active.
- Users are urged to deactivate and delete the vulnerable plugin until a patch is available.
Already a member? Log in here