CVE-2025-2056
📋 TL;DR
The WP Ghost (Hide My WP Ghost) plugin for WordPress has a path traversal vulnerability in the showFile function, allowing unauthenticated attackers to read specific file types on the server, potentially exposing sensitive information. This affects all versions up to and including 5.4.01, putting any WordPress site using this plugin at risk.
💻 Affected Systems
- WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive files like configuration files, logs, or credentials, leading to data breaches, privilege escalation, or further attacks.
Likely Case
Attackers exploit this to read accessible files, such as wp-config.php, to steal database credentials or other sensitive data.
If Mitigated
With proper file permissions and network segmentation, impact is limited to non-critical files, but risk remains if sensitive data is exposed.
🎯 Exploit Status
Exploitation is straightforward via crafted HTTP requests to the vulnerable function, requiring no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.4.02
Vendor Advisory: https://plugins.trac.wordpress.org/browser/hide-my-wp/tags/5.4.02/models/Files.php#L336
Restart Required: No
Instructions:
1. Log into the WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Hide My WP Ghost' and click 'Update Now' to version 5.4.02 or later. 4. Verify the update is successful.
🔧 Temporary Workarounds
Disable the plugin
WordPressTemporarily deactivate the WP Ghost plugin to prevent exploitation until patching is possible.
wp plugin deactivate hide-my-wp-ghost
🧯 If You Can't Patch
- Implement strict file permissions to limit access to sensitive files on the server.
- Use a web application firewall (WAF) to block path traversal attempts and monitor for suspicious requests.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 5.4.01 or earlier, it is vulnerable.
Check Version:
wp plugin get hide-my-wp-ghost --field=version
Verify Fix Applied:
After updating, confirm the plugin version is 5.4.02 or later in the WordPress admin plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to paths containing 'showFile' or attempts to access files like wp-config.php via the plugin.
Network Indicators:
- Suspicious GET requests with parameters attempting directory traversal sequences (e.g., '../') to the plugin endpoint.
SIEM Query:
source="web_logs" AND (uri="*showFile*" AND (uri="*../*" OR uri="*wp-config.php*"))