CVE-2025-30829
Published: 27 March 2025
Description
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Security Summary
CVE-2025-30829 is an Improper Control of Filename for Include/Require Statement vulnerability, known as PHP Remote File Inclusion, in the Arraytics WPCafe (wp-cafe) WordPress plugin. It enables PHP Local File Inclusion and affects all versions from n/a through 2.2.31.
The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with metrics AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. Low-privileged authenticated users can exploit it over the network with high attack complexity and no user interaction, achieving high impacts on confidentiality, integrity, and availability through local file inclusion.
Patchstack provides details on the vulnerability, including mitigation guidance, in its advisory at https://patchstack.com/database/Wordpress/Plugin/wp-cafe/vulnerability/wordpress-wpcafe-plugin-2-2-31-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability is a local file inclusion flaw in a public-facing WordPress plugin, directly enabling exploitation of public-facing applications (T1190), data collection from local system files (T1005), and code execution via included PHP scripts (T1059).