CVE-2025-0365
📋 TL;DR
The Jupiter X Core WordPress plugin contains a directory traversal vulnerability in its inline SVG feature. Authenticated attackers with Contributor-level access or higher can read arbitrary files on the server, potentially exposing sensitive information like configuration files, credentials, or database contents. This affects all WordPress sites using Jupiter X Core plugin versions up to 4.8.7.
💻 Affected Systems
- Jupiter X Core WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain database credentials, SSH keys, or other sensitive files leading to complete site compromise, data theft, or server takeover.
Likely Case
Attackers read wp-config.php to obtain database credentials, potentially leading to database access and site defacement or data exfiltration.
If Mitigated
With proper file permissions and security controls, attackers can only read publicly accessible files with minimal impact.
🎯 Exploit Status
Exploitation requires Contributor-level WordPress account. The vulnerability is in the inline SVG widget file handling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.8.8
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/inline-svg/widgets/inline-svg.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Jupiter X Core. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.8.8+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Remove Contributor Role Access
allTemporarily restrict Contributor role access or elevate authentication requirements
Disable Inline SVG Feature
allDisable the vulnerable inline SVG widget functionality
🧯 If You Can't Patch
- Implement strict file permissions (chmod 600 for sensitive files)
- Add web application firewall rules to block directory traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Jupiter X Core version. If version is 4.8.7 or lower, you are vulnerable.
Check Version:
wp plugin list --name=jupiterx-core --field=version
Verify Fix Applied:
Verify Jupiter X Core plugin version is 4.8.8 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file read attempts in web server logs
- Multiple requests with '../' patterns from Contributor accounts
Network Indicators:
- HTTP requests containing '../' patterns to inline SVG endpoints
SIEM Query:
source="web_server_logs" AND (uri="*../*" OR uri="*inline-svg*") AND user_agent="*WordPress*"