The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-39411

CVE-2025-39411: WhatsApp Click to Chat Plugin RCE Flaw

CVE-2025-39411 is a PHP remote file inclusion vulnerability in WhatsApp Click to Chat Plugin for WordPress that enables remote code execution. This article covers the technical details, affected versions through 2.2.12, and mitigation.

Published: May 4, 2026

CVE-2025-39411 Overview

CVE-2025-39411 is a PHP Remote File Inclusion (RFI) vulnerability in the Indie_Plugins WhatsApp Click to Chat Plugin for WordPress (wpt-whatsapp). The flaw affects all plugin versions up to and including 2.2.12. It is classified under CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program.

An attacker can manipulate a filename parameter passed to a PHP include or require statement, causing the plugin to load attacker-controlled code. Successful exploitation requires user interaction and high attack complexity but yields full impact on confidentiality, integrity, and availability.

Critical Impact

Successful exploitation enables arbitrary PHP code execution on the WordPress host, leading to full site compromise, data theft, and lateral movement.

Affected Products

  • Indie_Plugins WhatsApp Click to Chat Plugin for WordPress (wpt-whatsapp) versions n/a through 2.2.12
  • WordPress installations with the wpt-whatsapp plugin enabled
  • Any hosting environment running the affected plugin version

Discovery Timeline

  • 2025-05-19 - CVE-2025-39411 published to NVD
  • 2026-04-23 - Last updated in NVD database

Technical Details for CVE-2025-39411

Vulnerability Analysis

The vulnerability stems from improper control over a filename argument supplied to a PHP file inclusion statement within the wpt-whatsapp plugin. When user-controlled input reaches an include, include_once, require, or require_once call without sanitization or allowlisting, PHP interprets and executes the referenced file as code.

In an RFI scenario, the loaded file can originate from a remote URL or a local path the attacker has populated. The result is arbitrary PHP code execution in the context of the web server process. According to the EPSS model, the vulnerability has a probability score of 0.561% (68th percentile) for exploitation activity.

Root Cause

The plugin passes externally influenced data into a PHP file inclusion function without validating the resolved path against a known-good list. PHP's file inclusion functions resolve relative paths, URL wrappers, and protocol streams when permitted by configuration, which expands the attack surface.

Attack Vector

The attack vector is network-based. Exploitation requires user interaction, such as enticing an authenticated WordPress user or administrator to visit a crafted URL that triggers the vulnerable code path. The attacker supplies a parameter pointing to a malicious payload, which the plugin then includes and executes. Detailed advisory information is available in the Patchstack WordPress Vulnerability Report.

No public proof-of-concept exploit code is currently associated with this CVE.

Detection Methods for CVE-2025-39411

Indicators of Compromise

  • Unexpected outbound HTTP/HTTPS requests from the WordPress server to attacker-controlled hosts during page rendering
  • New or modified PHP files in the wp-content/plugins/wpt-whatsapp/ directory or in WordPress upload paths
  • Web server access logs containing query parameters with values resembling URLs, php://, data://, or path traversal sequences targeting wpt-whatsapp endpoints
  • Anomalous PHP processes spawning shell commands or network connections

Detection Strategies

  • Inspect WordPress and reverse proxy logs for requests to wpt-whatsapp files containing suspicious filename parameters
  • Deploy a Web Application Firewall (WAF) ruleset that flags PHP wrapper schemes and externally hosted include targets
  • Compare plugin file hashes against a known-good baseline of version 2.2.12 or earlier to identify tampering

Monitoring Recommendations

  • Forward WordPress, PHP-FPM, and web server logs to a centralized SIEM for correlation and retention
  • Alert on PHP worker processes that initiate unexpected outbound connections or write to plugin directories
  • Track plugin inventory and version drift across WordPress estates to identify unpatched installations

How to Mitigate CVE-2025-39411

Immediate Actions Required

  • Identify all WordPress sites running the wpt-whatsapp plugin and confirm whether the version is 2.2.12 or earlier
  • Disable the WhatsApp Click to Chat Plugin until a patched release is installed
  • Restrict administrative access to WordPress and require multi-factor authentication to limit user-interaction attack paths
  • Review the affected hosts for signs of compromise before restoring the plugin

Patch Information

At the time of publication, the NVD entry references the Patchstack WordPress Vulnerability Report as the authoritative source for fix availability. Administrators should upgrade to a plugin release later than 2.2.12 once published by the vendor and verify the new version on every affected site.

Workarounds

  • Remove or deactivate the wpt-whatsapp plugin and replace it with a maintained alternative if a patched version is unavailable
  • Set allow_url_include=Off and allow_url_fopen=Off in php.ini to block remote URL inclusion via PHP wrappers
  • Apply WAF rules that block requests carrying http://, https://, ftp://, php://, or data:// schemes in query parameters
  • Enforce least privilege on the web server user to limit damage if code execution occurs
ini
; php.ini hardening to mitigate PHP Remote File Inclusion
allow_url_include = Off
allow_url_fopen = Off
open_basedir = "/var/www/html:/tmp"
disable_functions = "exec,passthru,shell_exec,system,proc_open,popen"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechWordpress

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.56%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-98
  • Technical References
  • Patchstack WordPress Vulnerability Report
  • Related CVEs
  • CVE-2026-4882: WordPress URAF Plugin RCE Vulnerability

  • CVE-2026-7647: Profile Builder Pro WordPress RCE Flaw

  • CVE-2026-2052: WordPress Widget Options RCE Vulnerability

  • CVE-2026-5294: Geeky Bot WordPress Plugin RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English