CVE-2025-1565

7.5 HIGH

📋 TL;DR

The Mayosis Core WordPress plugin contains an arbitrary file read vulnerability in all versions up to 5.4.1. Unauthenticated attackers can exploit this to read sensitive files on the server, potentially exposing configuration files, credentials, and other confidential data. All WordPress sites using the vulnerable plugin are affected.

💻 Affected Systems

Products:
  • Mayosis Core WordPress Plugin
Versions: All versions up to and including 5.4.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Mayosis Core plugin active. The vulnerability is in the library/wave-audio/peaks/remote_dl.php file.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers read sensitive files like wp-config.php containing database credentials, SSH keys, or other configuration files, leading to full site compromise and data exfiltration.

🟠

Likely Case

Attackers read WordPress configuration files to obtain database credentials, then escalate access to take over the site or steal user data.

🟢

If Mitigated

With proper file permissions and web server restrictions, attackers can only read publicly accessible files, limiting exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to the vulnerable endpoint with file path parameter. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.2 or later

Vendor Advisory: https://themeforest.net/item/mayosis-digital-marketplace-theme/20210200

Restart Required: No

Instructions:

1. Update Mayosis Core plugin to version 5.4.2 or later via WordPress admin panel. 2. Verify the update completed successfully. 3. Clear any caching plugins or CDN caches.

🔧 Temporary Workarounds

Delete vulnerable file

linux

Remove the vulnerable remote_dl.php file to prevent exploitation

rm /path/to/wordpress/wp-content/plugins/mayosis-core/library/wave-audio/peaks/remote_dl.php

Web server restriction

all

Block access to the vulnerable endpoint via web server configuration

# Apache: <LocationMatch "remote_dl\.php">
    Order deny,allow
    Deny from all
</LocationMatch>
# Nginx: location ~* remote_dl\.php { deny all; }

🧯 If You Can't Patch

  • Restrict file permissions on sensitive configuration files
  • Implement web application firewall rules to block requests to remote_dl.php

🔍 How to Verify

Check if Vulnerable:

Check if file exists: wp-content/plugins/mayosis-core/library/wave-audio/peaks/remote_dl.php. If exists and plugin version ≤5.4.1, vulnerable.

Check Version:

grep "Version:" /path/to/wordpress/wp-content/plugins/mayosis-core/mayosis-core.php

Verify Fix Applied:

Verify remote_dl.php file is removed or inaccessible, and plugin version is ≥5.4.2.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/mayosis-core/library/wave-audio/peaks/remote_dl.php with file parameter
  • Unusual file read patterns from web server process

Network Indicators:

  • GET requests to remote_dl.php with file path traversal parameters

SIEM Query:

source="web_access.log" AND uri="*remote_dl.php*" AND (query="*file=*" OR query="*path=*")

🔗 References

📤 Share & Export