CVE-2025-15491

5.5 MEDIUM

📋 TL;DR

The Post Slides WordPress plugin through version 1.0.1 contains a Local File Inclusion (LFI) vulnerability. Authenticated users with contributor-level permissions or higher can exploit improper shortcode attribute validation to include arbitrary files from the server. This affects all WordPress sites using vulnerable versions of the Post Slides plugin.

💻 Affected Systems

Products:
  • Post Slides WordPress Plugin
Versions: through 1.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Post Slides plugin enabled and at least one authenticated user with contributor role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive server files (configuration files, password hashes, database credentials), potentially leading to full server compromise and data exfiltration.

🟠

Likely Case

Authenticated attackers reading WordPress configuration files (wp-config.php) to obtain database credentials and escalate access.

🟢

If Mitigated

Limited file read capability within web-accessible directories if proper file permissions are configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://wpscan.com/vulnerability/eb0424cc-e60c-44a5-aa24-cd1fe042b27a/

Restart Required: No

Instructions:

1. Check WordPress admin panel for plugin updates. 2. If no update available, disable or remove the Post Slides plugin. 3. Monitor plugin repository for security updates.

🔧 Temporary Workarounds

Disable Post Slides Plugin

all

Temporarily disable the vulnerable plugin until a patch is available

wp plugin deactivate post-slides

Restrict User Roles

all

Limit contributor and author roles to trusted users only

🧯 If You Can't Patch

  • Implement strict file permissions (chmod 600 for sensitive files)
  • Use web application firewall (WAF) rules to block LFI patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Post Slides version. If version is 1.0.1 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=post-slides --field=version

Verify Fix Applied:

Verify Post Slides plugin is either updated to version after 1.0.1 or completely removed from plugins directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file include requests in WordPress debug logs
  • Multiple failed include attempts from same user

Network Indicators:

  • HTTP requests with suspicious file path parameters in shortcode attributes

SIEM Query:

source="wordpress.log" AND "include" AND "post-slides" AND (".." OR "/etc/" OR "/proc/")

🔗 References

📤 Share & Export