CVE-2025-1771
Published: 15 March 2025
Description
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Security Summary
CVE-2025-1771 is a local file inclusion (LFI) vulnerability affecting the Traveler theme for WordPress in all versions up to and including 3.1.8. The flaw resides in the 'hotel_alone_load_more_post' function, specifically the 'style' parameter, which allows unauthenticated attackers to include and execute arbitrary files on the server. This vulnerability, associated with CWE-98, enables the execution of PHP code within included files.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation permits bypassing access controls, obtaining sensitive data, or achieving remote code execution, particularly if PHP files can be uploaded and subsequently included.
Advisories from the Traveler changelog at https://travelerwp.com/traveler-changelog/ and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve provide further details on the issue. Security practitioners should consult these sources for patch information and mitigation guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
LFI in public-facing WordPress app enables T1190 for remote exploitation; arbitrary file inclusion facilitates T1005 for local data access and T1100 for RCE via PHP web shell inclusion.