Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Josh Kohlbach WooCommerce Store Toolkit woocommerce-store-toolkit allows PHP Local File Inclusion.This issue affects WooCommerce Store Toolkit: from n/a through <= 2.4.3.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of the filename used in PHP include/require statements, classified as CWE‑98. By exploiting this flaw, an attacker can cause the plugin to read arbitrary files on the server, potentially revealing sensitive configuration data or enabling remote code execution if privileged files are accessible.

Affected Systems

The WooCommerce Store Toolkit plugin developed by Josh Kohlbach, specifically all releases through version 2.4.3, are affected. Users running any of these versions on a WordPress site are at risk.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, but the EPSS score of less than 1% suggests that exploitation is currently rare. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an unauthenticated or low‑privilege attacker manipulating a filename parameter via a crafted URL or form submission directed at the plugin’s file‑inclusion endpoint. Successful exploitation would provide the attacker with access to arbitrary local files and, in worst cases, the ability to execute malicious code.

Generated by OpenCVE AI on April 29, 2026 at 23:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WooCommerce Store Toolkit to the latest version (2.4.4 or newer) to eliminate the flaw.
  • If an upgrade cannot be performed, disable or remove the plugin’s file‑inclusion endpoint to block the vulnerable path.
  • Implement input validation by ensuring any filename parameters are strictly whitelisted and sanitized before use in include/require statements.
  • Monitor server logs for suspicious file‑inclusion attempts and audit access to the plugin’s directories.

Generated by OpenCVE AI on April 29, 2026 at 23:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Josh Kohlbach
Josh Kohlbach woocommerce Store Toolkit
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Josh Kohlbach
Josh Kohlbach woocommerce Store Toolkit
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Josh Kohlbach WooCommerce Store Toolkit woocommerce-store-toolkit allows PHP Local File Inclusion.This issue affects WooCommerce Store Toolkit: from n/a through <= 2.4.3.
Title WordPress WooCommerce Store Toolkit plugin <= 2.4.3 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Josh Kohlbach Woocommerce Store Toolkit
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:57.688Z

Reserved: 2025-09-25T15:28:42.280Z

Link: CVE-2025-60204

cve-icon Vulnrichment

Updated: 2025-11-06T17:34:44.250Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:06.010

Modified: 2026-04-27T16:16:33.613

Link: CVE-2025-60204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:15:23Z

Weaknesses