Improper Control of Filename Vulnerability in WhatsApp Click to Chat Plugin by WordPress
CVE-2025-39411

7.5HIGH

What is CVE-2025-39411?

A vulnerability has been identified in the WhatsApp Click to Chat Plugin for WordPress, which arises from improper control of filenames within PHP Include/Require statements. This flaw could potentially allow an attacker to exploit the affected versions (up to 2.2.12) to include remote files, posing a serious risk to the integrity of the WordPress installation. Website administrators using this plugin should take immediate action to mitigate potential risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

WhatsApp Click to Chat Plugin for WordPress <= 2.2.12

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bonds (Patchstack Alliance)
.