Cyber Posture

CVE-2025-1707

High

Published: 11 March 2025

Published
11 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.

Security Summary

CVE-2025-1707 is a Local File Inclusion (LFI) vulnerability (CWE-98) affecting the Review Schema plugin for WordPress in all versions up to and including 2.2.4. The flaw occurs via post meta handling, enabling the inclusion and execution of arbitrary files on the server. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for confidentiality, integrity, and availability impacts.

Authenticated attackers with contributor-level permissions or higher can exploit this vulnerability remotely over the network with low complexity. By manipulating post meta, they can include arbitrary files, execute PHP code within those files, bypass access controls, obtain sensitive data, or achieve remote code execution if PHP files are uploadable and includable.

Wordfence advisories provide detailed threat intelligence on the vulnerability, while the plugin's Trac repository shows the vulnerable code at line 108 in ReviewSchema.php (version 2.2.4) and a patch applied in changeset 3253799. Security practitioners should update the plugin beyond version 2.2.4 to mitigate the issue.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

LFI in public-facing WordPress plugin enables remote file inclusion and PHP code execution by authenticated users, directly mapping to exploitation of public-facing applications (T1190) and command/scripting interpreter usage for RCE (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References